Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2010-3081
Vulnerability from cvelistv5
Published
2010-09-24 19:00
Modified
2024-08-07 02:55
Severity ?
EPSS score ?
Summary
The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T02:55:46.715Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0017.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://isc.sans.edu/diary.html?storyid=9574" }, { "name": "ADV-2010-3083", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/3083" }, { "name": "ADV-2010-3117", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2010/3117" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://sota.gen.nz/compat1/" }, { "name": "MDVSA-2010:198", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://access.redhat.com/kb/docs/DOC-40265" }, { "name": "20101130 VMSA-2010-0017 VMware ESX third party update for Service Console kerne", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/514938/30/30/threaded" }, { "name": "42384", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/42384" }, { "name": "20100916 Workaround for Ac1db1tch3z exploit.", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0278.html" }, { "name": "SUSE-SA:2011:007", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { "name": "RHSA-2010:0842", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0842.html" }, { "name": "MDVSA-2010:247", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:247" }, { "name": "ADV-2011-0298", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2011/0298" }, { "name": "RHSA-2010:0882", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0882.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.36-rc4-git2.log" }, { "name": "SUSE-SA:2010:050", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://blog.ksplice.com/2010/09/cve-2010-3081/" }, { "name": "43315", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/43315" }, { "name": "SUSE-SR:2010:017", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html" }, { "name": "20100916 Ac1db1tch3z vs x86_64 Linux Kernel", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0273.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c41d68a513c71e35a14f66d71782d27a79a81ea6" }, { "name": "RHSA-2010:0758", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0758.html" }, { "name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "name": "MDVSA-2010:214", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:214" }, { "name": "[oss-security] 20100916 CVE-2010-3081 kernel: 64-bit Compatibility Mode Stack Pointer Underflow", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://marc.info/?l=oss-security\u0026m=128461522230211\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-10T18:57:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0017.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://isc.sans.edu/diary.html?storyid=9574" }, { "name": "ADV-2010-3083", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/3083" }, { "name": "ADV-2010-3117", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2010/3117" }, { "tags": [ "x_refsource_MISC" ], "url": "http://sota.gen.nz/compat1/" }, { "name": "MDVSA-2010:198", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://access.redhat.com/kb/docs/DOC-40265" }, { "name": "20101130 VMSA-2010-0017 VMware ESX third party update for Service Console kerne", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/514938/30/30/threaded" }, { "name": "42384", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/42384" }, { "name": "20100916 Workaround for Ac1db1tch3z exploit.", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0278.html" }, { "name": "SUSE-SA:2011:007", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { "name": "RHSA-2010:0842", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0842.html" }, { "name": "MDVSA-2010:247", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:247" }, { "name": "ADV-2011-0298", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2011/0298" }, { "name": "RHSA-2010:0882", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0882.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.36-rc4-git2.log" }, { "name": "SUSE-SA:2010:050", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://blog.ksplice.com/2010/09/cve-2010-3081/" }, { "name": "43315", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/43315" }, { "name": "SUSE-SR:2010:017", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html" }, { "name": "20100916 Ac1db1tch3z vs x86_64 Linux Kernel", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0273.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c41d68a513c71e35a14f66d71782d27a79a81ea6" }, { "name": "RHSA-2010:0758", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0758.html" }, { "name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "name": "MDVSA-2010:214", "tags": [ "vendor-advisory", "x_refsource_MANDRIVA" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:214" }, { "name": "[oss-security] 20100916 CVE-2010-3081 kernel: 64-bit Compatibility Mode Stack Pointer Underflow", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://marc.info/?l=oss-security\u0026m=128461522230211\u0026w=2" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-3081", "datePublished": "2010-09-24T19:00:00", "dateReserved": "2010-08-20T00:00:00", "dateUpdated": "2024-08-07T02:55:46.715Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2010-3081\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2010-09-24T20:00:02.183\",\"lastModified\":\"2024-11-21T01:17:59.600\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \\\"stack pointer underflow\\\" issue, as exploited in the wild in September 2010.\"},{\"lang\":\"es\",\"value\":\"Las funciones compat_alloc_user_space en los ficheros include/asm/compat.h del kernel de Linux en versiones anteriores a la v2.6.36-rc4-git2 en plataformas de 64-bit no reservan adecuadamente la memoria del espacio de usuario requerida para la capa de compatibilidad de 32-bit, lo que permite a usuarios locales escalar privilegios bas\u00e1ndose en la capacidad de la funci\u00f3n compat_mc_getsockopt (tambi\u00e9n conocido como soporte MCAST_MSFILTER getsockopt) para controlar un valor de longitud determinado, relacionado con un \\\"stack pointer underflow\\\", como se ha demostrado en septiembre del 2010.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6.35.4\",\"matchCriteriaId\":\"FC70229A-6997-4ECC-8643-5292E58B7C26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4407EF9-4ECF-408F-9ECB-0705E3FB65D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBE26099-6D2C-4FAF-B15C-CBF985D59171\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2C193FF-3723-4BE9-8787-DED7D455FA8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"F874FE6A-968D-47E1-900A-E154E41EDAF8\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC337BB7-9A45-4406-A783-851F279130EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B6BA46F-4E8C-4B2A-AE92-81B9F1B4D56C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"10A193CD-12B9-4236-8A2C-E8CEAE592952\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F691F4E7-2FF1-4EFB-B21F-E510049A9940\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0273.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0278.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://blog.ksplice.com/2010/09/cve-2010-3081/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c41d68a513c71e35a14f66d71782d27a79a81ea6\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://isc.sans.edu/diary.html?storyid=9574\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=128461522230211\u0026w=2\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42384\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/43315\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://sota.gen.nz/compat1/\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.36-rc4-git2.log\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:198\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:214\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:247\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0758.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0842.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0882.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/archive/1/514938/30/30/threaded\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/516397/100/0/threaded\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2010-0017.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0003.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/3083\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/3117\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0298\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://access.redhat.com/kb/docs/DOC-40265\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=634457\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0273.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0278.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://blog.ksplice.com/2010/09/cve-2010-3081/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c41d68a513c71e35a14f66d71782d27a79a81ea6\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://isc.sans.edu/diary.html?storyid=9574\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Third Party Advisory\"]},{\"url\":\"http://marc.info/?l=oss-security\u0026m=128461522230211\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://secunia.com/advisories/42384\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/43315\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://sota.gen.nz/compat1/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.36-rc4-git2.log\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:198\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:214\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2010:247\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0758.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0842.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2010-0882.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/archive/1/514938/30/30/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/archive/1/516397/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2010-0017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vmware.com/security/advisories/VMSA-2011-0003.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/3083\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2010/3117\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.vupen.com/english/advisories/2011/0298\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"https://access.redhat.com/kb/docs/DOC-40265\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=634457\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\",\"Third Party Advisory\"]}]}}" } }
rhsa-2010_0705
Vulnerability from csaf_redhat
Published
2010-09-21 08:16
Modified
2024-11-22 03:46
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.4 Extended Update Support.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issue:
* The compat_alloc_user_space() function in the Linux kernel 32/64-bit
compatibility layer implementation was missing sanity checks. This function
could be abused in other areas of the Linux kernel if its length argument
can be controlled from user-space. On 64-bit systems, a local, unprivileged
user could use this flaw to escalate their privileges. (CVE-2010-3081,
Important)
Red Hat would like to thank Ben Hawkes for reporting this issue.
Red Hat is aware that a public exploit for this issue is available. Refer
to Knowledgebase article DOC-40265 for further details:
https://access.redhat.com/kb/docs/DOC-40265
Users should upgrade to these updated packages, which contain a backported
patch to correct this issue. The system must be rebooted for this update to
take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix one security issue are now available for\nRed Hat Enterprise Linux 5.4 Extended Update Support.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issue:\n\n* The compat_alloc_user_space() function in the Linux kernel 32/64-bit\ncompatibility layer implementation was missing sanity checks. This function\ncould be abused in other areas of the Linux kernel if its length argument\ncan be controlled from user-space. On 64-bit systems, a local, unprivileged\nuser could use this flaw to escalate their privileges. (CVE-2010-3081,\nImportant)\n\nRed Hat would like to thank Ben Hawkes for reporting this issue.\n\nRed Hat is aware that a public exploit for this issue is available. Refer\nto Knowledgebase article DOC-40265 for further details:\nhttps://access.redhat.com/kb/docs/DOC-40265\n\nUsers should upgrade to these updated packages, which contain a backported\npatch to correct this issue. The system must be rebooted for this update to\ntake effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0705", "url": "https://access.redhat.com/errata/RHSA-2010:0705" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/kb/docs/DOC-40265", "url": "https://access.redhat.com/kb/docs/DOC-40265" }, { "category": "external", "summary": "634457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0705.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-22T03:46:45+00:00", "generator": { "date": "2024-11-22T03:46:45+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0705", "initial_release_date": "2010-09-21T08:16:00+00:00", "revision_history": [ { "date": "2010-09-21T08:16:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-09-21T04:39:17+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:46:45+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux EUS (v. 5.4 server)", "product": { "name": "Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:5.4" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-164.25.2.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-164.25.2.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-164.25.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.25.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-164.25.2.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-164.25.2.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-164.25.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.25.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-164.25.2.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-164.25.2.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-164.25.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-164.25.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-164.25.2.el5.i686", "product": { "name": "kernel-0:2.6.18-164.25.2.el5.i686", "product_id": "kernel-0:2.6.18-164.25.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-164.25.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-164.25.2.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-164.25.2.el5.i686", "product_id": "kernel-devel-0:2.6.18-164.25.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.25.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-164.25.2.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-164.25.2.el5.i686", "product_id": "kernel-xen-0:2.6.18-164.25.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.25.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-164.25.2.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-164.25.2.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-164.25.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.25.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.25.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-164.25.2.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-164.25.2.el5.i686", "product_id": "kernel-debug-0:2.6.18-164.25.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.25.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-164.25.2.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-164.25.2.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-164.25.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.25.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-164.25.2.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-164.25.2.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-164.25.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-164.25.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-164.25.2.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-164.25.2.el5.i686", "product_id": "kernel-PAE-0:2.6.18-164.25.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-164.25.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.25.2.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-164.25.2.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-164.25.2.el5.i386", "product_id": "kernel-headers-0:2.6.18-164.25.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.25.2.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-164.25.2.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-164.25.2.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-164.25.2.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.25.2.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-164.25.2.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-164.25.2.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-164.25.2.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.25.2.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-164.25.2.el5.ia64", "product": { "name": "kernel-0:2.6.18-164.25.2.el5.ia64", "product_id": "kernel-0:2.6.18-164.25.2.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-164.25.2.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-164.25.2.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-164.25.2.el5.ia64", "product_id": "kernel-headers-0:2.6.18-164.25.2.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.25.2.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-164.25.2.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-164.25.2.el5.ia64", "product_id": "kernel-devel-0:2.6.18-164.25.2.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.25.2.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-164.25.2.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-164.25.2.el5.ia64", "product_id": "kernel-xen-0:2.6.18-164.25.2.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.25.2.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-164.25.2.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-164.25.2.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-164.25.2.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.25.2.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.25.2.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-164.25.2.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-164.25.2.el5.ia64", "product_id": "kernel-debug-0:2.6.18-164.25.2.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.25.2.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-164.25.2.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-164.25.2.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-164.25.2.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.25.2.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.25.2.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-164.25.2.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-164.25.2.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-164.25.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.25.2.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-164.25.2.el5.ppc64", "product": { "name": "kernel-0:2.6.18-164.25.2.el5.ppc64", "product_id": "kernel-0:2.6.18-164.25.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-164.25.2.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-164.25.2.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-164.25.2.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-164.25.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-164.25.2.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-164.25.2.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-164.25.2.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-164.25.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-164.25.2.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-164.25.2.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-164.25.2.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-164.25.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-164.25.2.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-164.25.2.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-164.25.2.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-164.25.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.25.2.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-164.25.2.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-164.25.2.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-164.25.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.25.2.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-164.25.2.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-164.25.2.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-164.25.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.25.2.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.25.2.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-164.25.2.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-164.25.2.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-164.25.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.25.2.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-164.25.2.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-164.25.2.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-164.25.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.25.2.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-164.25.2.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-164.25.2.el5.ppc", "product_id": "kernel-headers-0:2.6.18-164.25.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.25.2.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-164.25.2.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-164.25.2.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-164.25.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.25.2.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-164.25.2.el5.s390x", "product": { "name": "kernel-0:2.6.18-164.25.2.el5.s390x", "product_id": "kernel-0:2.6.18-164.25.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-164.25.2.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-164.25.2.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-164.25.2.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-164.25.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-164.25.2.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-164.25.2.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-164.25.2.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-164.25.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-164.25.2.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-164.25.2.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-164.25.2.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-164.25.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-164.25.2.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-164.25.2.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-164.25.2.el5.s390x", "product_id": "kernel-headers-0:2.6.18-164.25.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.25.2.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-164.25.2.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-164.25.2.el5.s390x", "product_id": "kernel-devel-0:2.6.18-164.25.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.25.2.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-164.25.2.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-164.25.2.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-164.25.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.25.2.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.25.2.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-164.25.2.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-164.25.2.el5.s390x", "product_id": "kernel-debug-0:2.6.18-164.25.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.25.2.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-164.25.2.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-164.25.2.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-164.25.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.25.2.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-164.25.2.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-164.25.2.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-164.25.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-164.25.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-164.25.2.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-164.25.2.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-164.25.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-164.25.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-164.25.2.el5.x86_64", "product": { "name": "kernel-0:2.6.18-164.25.2.el5.x86_64", "product_id": "kernel-0:2.6.18-164.25.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-164.25.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-164.25.2.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-164.25.2.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-164.25.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-164.25.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-164.25.2.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-164.25.2.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-164.25.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-164.25.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-164.25.2.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-164.25.2.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-164.25.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-164.25.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-164.25.2.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-164.25.2.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-164.25.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-164.25.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-164.25.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-164.25.2.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-164.25.2.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-164.25.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-164.25.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-164.25.2.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-164.25.2.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-164.25.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-164.25.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-164.25.2.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-164.25.2.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-164.25.2.el5.noarch", "product_id": "kernel-doc-0:2.6.18-164.25.2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-164.25.2.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-164.25.2.el5.src", "product": { "name": "kernel-0:2.6.18-164.25.2.el5.src", "product_id": "kernel-0:2.6.18-164.25.2.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-164.25.2.el5?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.25.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-0:2.6.18-164.25.2.el5.i686" }, "product_reference": "kernel-0:2.6.18-164.25.2.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.25.2.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-0:2.6.18-164.25.2.el5.ia64" }, "product_reference": "kernel-0:2.6.18-164.25.2.el5.ia64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.25.2.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-0:2.6.18-164.25.2.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-164.25.2.el5.ppc64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.25.2.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-0:2.6.18-164.25.2.el5.s390x" }, "product_reference": "kernel-0:2.6.18-164.25.2.el5.s390x", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.25.2.el5.src as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-0:2.6.18-164.25.2.el5.src" }, "product_reference": "kernel-0:2.6.18-164.25.2.el5.src", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-164.25.2.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-0:2.6.18-164.25.2.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-164.25.2.el5.x86_64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-164.25.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-PAE-0:2.6.18-164.25.2.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-164.25.2.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-164.25.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-PAE-debuginfo-0:2.6.18-164.25.2.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-164.25.2.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-164.25.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-PAE-devel-0:2.6.18-164.25.2.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-164.25.2.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.25.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-0:2.6.18-164.25.2.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-164.25.2.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.25.2.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-0:2.6.18-164.25.2.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-164.25.2.el5.ia64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.25.2.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-0:2.6.18-164.25.2.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-164.25.2.el5.ppc64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.25.2.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-0:2.6.18-164.25.2.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-164.25.2.el5.s390x", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-164.25.2.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-0:2.6.18-164.25.2.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-164.25.2.el5.x86_64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.ia64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.ppc64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.s390x", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.x86_64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.25.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.25.2.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.25.2.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.25.2.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.25.2.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.25.2.el5.ia64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.25.2.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.25.2.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.25.2.el5.ppc64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.25.2.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.25.2.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.25.2.el5.s390x", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-164.25.2.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.25.2.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-164.25.2.el5.x86_64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.25.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.25.2.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.25.2.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.25.2.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.25.2.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.25.2.el5.ia64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.25.2.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.25.2.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.25.2.el5.ppc64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.25.2.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.25.2.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.25.2.el5.s390x", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-164.25.2.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.25.2.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-164.25.2.el5.x86_64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.25.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.25.2.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.25.2.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.25.2.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.25.2.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.25.2.el5.ia64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.25.2.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.25.2.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.25.2.el5.ppc64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.25.2.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.25.2.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.25.2.el5.s390x", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-164.25.2.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.25.2.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-164.25.2.el5.x86_64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.25.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-devel-0:2.6.18-164.25.2.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-164.25.2.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.25.2.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-devel-0:2.6.18-164.25.2.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-164.25.2.el5.ia64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.25.2.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-devel-0:2.6.18-164.25.2.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-164.25.2.el5.ppc64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.25.2.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-devel-0:2.6.18-164.25.2.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-164.25.2.el5.s390x", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-164.25.2.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-devel-0:2.6.18-164.25.2.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-164.25.2.el5.x86_64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-164.25.2.el5.noarch as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-doc-0:2.6.18-164.25.2.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-164.25.2.el5.noarch", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.25.2.el5.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-headers-0:2.6.18-164.25.2.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-164.25.2.el5.i386", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.25.2.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-headers-0:2.6.18-164.25.2.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-164.25.2.el5.ia64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.25.2.el5.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-headers-0:2.6.18-164.25.2.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-164.25.2.el5.ppc", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.25.2.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-headers-0:2.6.18-164.25.2.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-164.25.2.el5.ppc64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.25.2.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-headers-0:2.6.18-164.25.2.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-164.25.2.el5.s390x", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-164.25.2.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-headers-0:2.6.18-164.25.2.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-164.25.2.el5.x86_64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-164.25.2.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.25.2.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-164.25.2.el5.ppc64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-164.25.2.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.25.2.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-164.25.2.el5.s390x", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-164.25.2.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.25.2.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.25.2.el5.ppc64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-164.25.2.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.25.2.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-164.25.2.el5.s390x", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-164.25.2.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.25.2.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-164.25.2.el5.ppc64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-164.25.2.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.25.2.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-164.25.2.el5.s390x", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-164.25.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-xen-0:2.6.18-164.25.2.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-164.25.2.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-164.25.2.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-xen-0:2.6.18-164.25.2.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-164.25.2.el5.ia64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-164.25.2.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-xen-0:2.6.18-164.25.2.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-164.25.2.el5.x86_64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.ia64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.x86_64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-164.25.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.25.2.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-164.25.2.el5.i686", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-164.25.2.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.25.2.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-164.25.2.el5.ia64", "relates_to_product_reference": "5Server-5.4.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-164.25.2.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.4 server)", "product_id": "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.25.2.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-164.25.2.el5.x86_64", "relates_to_product_reference": "5Server-5.4.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ben Hawkes" ] } ], "cve": "CVE-2010-3081", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "634457" } ], "notes": [ { "category": "description", "text": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow", "title": "Vulnerability summary" }, { "category": "other", "text": "More information can be found in this kbase: https://access.redhat.com/kb/docs/DOC-40265.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.4.Z:kernel-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-0:2.6.18-164.25.2.el5.src", "5Server-5.4.Z:kernel-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-PAE-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-PAE-debuginfo-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-PAE-devel-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-doc-0:2.6.18-164.25.2.el5.noarch", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.25.2.el5.i386", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.25.2.el5.ppc", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.25.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3081" }, { "category": "external", "summary": "RHBZ#634457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3081", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-09-21T08:16:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-5.4.Z:kernel-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-0:2.6.18-164.25.2.el5.src", "5Server-5.4.Z:kernel-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-PAE-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-PAE-debuginfo-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-PAE-devel-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-doc-0:2.6.18-164.25.2.el5.noarch", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.25.2.el5.i386", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.25.2.el5.ppc", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.25.2.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0705" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-5.4.Z:kernel-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-0:2.6.18-164.25.2.el5.src", "5Server-5.4.Z:kernel-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-PAE-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-PAE-debuginfo-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-PAE-devel-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-debug-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-debug-debuginfo-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-debug-devel-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-debuginfo-common-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-devel-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-doc-0:2.6.18-164.25.2.el5.noarch", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.25.2.el5.i386", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.25.2.el5.ppc", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-headers-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-kdump-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-kdump-debuginfo-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.25.2.el5.ppc64", "5Server-5.4.Z:kernel-kdump-devel-0:2.6.18-164.25.2.el5.s390x", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-xen-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-xen-debuginfo-0:2.6.18-164.25.2.el5.x86_64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.25.2.el5.i686", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.25.2.el5.ia64", "5Server-5.4.Z:kernel-xen-devel-0:2.6.18-164.25.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow" } ] }
rhsa-2010_0882
Vulnerability from csaf_redhat
Published
2010-11-12 09:36
Modified
2024-11-22 03:47
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix several security issues and one bug are
now available for Red Hat Enterprise Linux 3 Extended Life Cycle Support
(ELS).
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issues:
* An array index error was found in the gdth driver in the Linux kernel. A
local user could send a specially-crafted IOCTL request that would cause a
denial of service or, possibly, privilege escalation. (CVE-2009-3080,
Important)
* NULL pointer dereference flaws were found in the r128 driver in the Linux
kernel. Checks to test if the Concurrent Command Engine state was
initialized were missing in private IOCTL functions. An attacker could use
these flaws to cause a local denial of service or escalate their
privileges. (CVE-2009-3620, Important)
* A flaw was found in the Intel PRO/1000 Linux driver, e1000, in the Linux
kernel. A remote attacker using packets larger than the MTU could bypass
the existing fragment check, resulting in partial, invalid frames being
passed to the network stack. This flaw could also possibly be used to
trigger a remote denial of service. (CVE-2009-4536, Important)
* A use-after-free flaw was found in the tcp_rcv_state_process() function
in the Linux kernel TCP/IP protocol suite implementation. If a system using
IPv6 had the IPV6_PKTINFO option set on a listening socket, a remote
attacker could send an IPv6 packet to that system, causing a kernel panic
(denial of service). (CVE-2010-1188, Important)
* When an application has a stack overflow, the stack could silently
overwrite another memory mapped area instead of a segmentation fault
occurring, which could cause an application to execute arbitrary code,
possibly leading to privilege escalation. It is known that the X Window
System server can be used to trigger this flaw. (CVE-2010-2240, Important)
* The compat_alloc_user_space() function in the Linux kernel 32/64-bit
compatibility layer implementation was missing sanity checks. This function
could be abused in other areas of the Linux kernel. On 64-bit systems, a
local, unprivileged user could use this flaw to escalate their privileges.
(CVE-2010-3081, Important)
Red Hat would like to thank the X.Org security team for reporting the
CVE-2010-2240 issue, with upstream acknowledging Rafal Wojtczuk as the
original reporter; and Ben Hawkes for reporting the CVE-2010-3081 issue.
This update also fixes the following bug:
* The RHSA-2009:1550 kernel update introduced a regression that prevented
certain custom kernel modules from loading, failing with "unresolved
symbol" errors. This update corrects this issue, allowing the affected
modules to load as expected. (BZ#556909)
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues and one bug are\nnow available for Red Hat Enterprise Linux 3 Extended Life Cycle Support\n(ELS).\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* An array index error was found in the gdth driver in the Linux kernel. A\nlocal user could send a specially-crafted IOCTL request that would cause a\ndenial of service or, possibly, privilege escalation. (CVE-2009-3080,\nImportant)\n\n* NULL pointer dereference flaws were found in the r128 driver in the Linux\nkernel. Checks to test if the Concurrent Command Engine state was\ninitialized were missing in private IOCTL functions. An attacker could use\nthese flaws to cause a local denial of service or escalate their\nprivileges. (CVE-2009-3620, Important)\n\n* A flaw was found in the Intel PRO/1000 Linux driver, e1000, in the Linux\nkernel. A remote attacker using packets larger than the MTU could bypass\nthe existing fragment check, resulting in partial, invalid frames being\npassed to the network stack. This flaw could also possibly be used to\ntrigger a remote denial of service. (CVE-2009-4536, Important)\n\n* A use-after-free flaw was found in the tcp_rcv_state_process() function\nin the Linux kernel TCP/IP protocol suite implementation. If a system using\nIPv6 had the IPV6_PKTINFO option set on a listening socket, a remote\nattacker could send an IPv6 packet to that system, causing a kernel panic\n(denial of service). (CVE-2010-1188, Important)\n\n* When an application has a stack overflow, the stack could silently\noverwrite another memory mapped area instead of a segmentation fault\noccurring, which could cause an application to execute arbitrary code,\npossibly leading to privilege escalation. It is known that the X Window\nSystem server can be used to trigger this flaw. (CVE-2010-2240, Important)\n\n* The compat_alloc_user_space() function in the Linux kernel 32/64-bit\ncompatibility layer implementation was missing sanity checks. This function\ncould be abused in other areas of the Linux kernel. On 64-bit systems, a\nlocal, unprivileged user could use this flaw to escalate their privileges.\n(CVE-2010-3081, Important)\n\nRed Hat would like to thank the X.Org security team for reporting the\nCVE-2010-2240 issue, with upstream acknowledging Rafal Wojtczuk as the\noriginal reporter; and Ben Hawkes for reporting the CVE-2010-3081 issue.\n\nThis update also fixes the following bug:\n\n* The RHSA-2009:1550 kernel update introduced a regression that prevented\ncertain custom kernel modules from loading, failing with \"unresolved\nsymbol\" errors. This update corrects this issue, allowing the affected\nmodules to load as expected. (BZ#556909)\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0882", "url": "https://access.redhat.com/errata/RHSA-2010:0882" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/kb/docs/DOC-40265", "url": "https://access.redhat.com/kb/docs/DOC-40265" }, { "category": "external", "summary": "http://www.redhat.com/rhel/server/extended_lifecycle_support/", "url": "http://www.redhat.com/rhel/server/extended_lifecycle_support/" }, { "category": "external", "summary": "529597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597" }, { "category": "external", "summary": "539414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539414" }, { "category": "external", "summary": "552126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "category": "external", "summary": "556909", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=556909" }, { "category": "external", "summary": "577711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=577711" }, { "category": "external", "summary": "606611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=606611" }, { "category": "external", "summary": "634457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0882.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T03:47:18+00:00", "generator": { "date": "2024-11-22T03:47:18+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0882", "initial_release_date": "2010-11-12T09:36:00+00:00", "revision_history": [ { "date": "2010-11-12T09:36:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-11-12T04:36:39+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:47:18+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (v. 3 ELS)", "product": { "name": "Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:3::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES (v. 3 ELS)", "product": { "name": "Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_els:3::es" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-BOOT-0:2.4.21-66.EL.i386", "product": { "name": "kernel-BOOT-0:2.4.21-66.EL.i386", "product_id": "kernel-BOOT-0:2.4.21-66.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-BOOT@2.4.21-66.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-66.EL.i386", "product": { "name": "kernel-doc-0:2.4.21-66.EL.i386", "product_id": "kernel-doc-0:2.4.21-66.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-66.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-66.EL.i386", "product": { "name": "kernel-debuginfo-0:2.4.21-66.EL.i386", "product_id": "kernel-debuginfo-0:2.4.21-66.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-66.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-66.EL.i386", "product": { "name": "kernel-source-0:2.4.21-66.EL.i386", "product_id": "kernel-source-0:2.4.21-66.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-66.EL?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-66.EL.i686", "product": { "name": "kernel-unsupported-0:2.4.21-66.EL.i686", "product_id": "kernel-unsupported-0:2.4.21-66.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-66.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.4.21-66.EL.i686", "product": { "name": "kernel-hugemem-0:2.4.21-66.EL.i686", "product_id": "kernel-hugemem-0:2.4.21-66.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.4.21-66.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-66.EL.i686", "product": { "name": "kernel-0:2.4.21-66.EL.i686", "product_id": "kernel-0:2.4.21-66.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-66.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-66.EL.i686", "product": { "name": "kernel-smp-unsupported-0:2.4.21-66.EL.i686", "product_id": "kernel-smp-unsupported-0:2.4.21-66.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-66.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-66.EL.i686", "product": { "name": "kernel-debuginfo-0:2.4.21-66.EL.i686", "product_id": "kernel-debuginfo-0:2.4.21-66.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-66.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-66.EL.i686", "product": { "name": "kernel-smp-0:2.4.21-66.EL.i686", "product_id": "kernel-smp-0:2.4.21-66.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-66.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "product": { "name": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "product_id": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-unsupported@2.4.21-66.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-66.EL.athlon", "product": { "name": "kernel-unsupported-0:2.4.21-66.EL.athlon", "product_id": "kernel-unsupported-0:2.4.21-66.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-66.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-66.EL.athlon", "product": { "name": "kernel-0:2.4.21-66.EL.athlon", "product_id": "kernel-0:2.4.21-66.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-66.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "product": { "name": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "product_id": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-66.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-66.EL.athlon", "product": { "name": "kernel-debuginfo-0:2.4.21-66.EL.athlon", "product_id": "kernel-debuginfo-0:2.4.21-66.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-66.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-66.EL.athlon", "product": { "name": "kernel-smp-0:2.4.21-66.EL.athlon", "product_id": "kernel-smp-0:2.4.21-66.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-66.EL?arch=athlon" } } } ], "category": "architecture", "name": "athlon" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-66.EL.src", "product": { "name": "kernel-0:2.4.21-66.EL.src", "product_id": "kernel-0:2.4.21-66.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-66.EL?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-66.EL.src as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-0:2.4.21-66.EL.src" }, "product_reference": "kernel-0:2.4.21-66.EL.src", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-66.EL.i386", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.i386", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-66.EL.i386", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-66.EL.i386", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux AS (v. 3 ELS)", "product_id": "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3AS-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-66.EL.src as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-0:2.4.21-66.EL.src" }, "product_reference": "kernel-0:2.4.21-66.EL.src", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-66.EL.i386", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.i386", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-66.EL.i386", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-66.EL.i386 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-66.EL.i386", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-66.EL.athlon as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-66.EL.athlon", "relates_to_product_reference": "3ES-ELS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-66.EL.i686 as a component of Red Hat Enterprise Linux ES (v. 3 ELS)", "product_id": "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-66.EL.i686", "relates_to_product_reference": "3ES-ELS" } ] }, "vulnerabilities": [ { "cve": "CVE-2009-3080", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2009-11-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "539414" } ], "notes": [ { "category": "description", "text": "Array index error in the gdth_read_event function in drivers/scsi/gdth.c in the Linux kernel before 2.6.32-rc8 allows local users to cause a denial of service or possibly gain privileges via a negative event index in an IOCTL request.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: gdth: Prevent negative offsets in ioctl", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3080" }, { "category": "external", "summary": "RHBZ#539414", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=539414" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3080", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3080" } ], "release_date": "2009-11-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-12T09:36:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0882" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: gdth: Prevent negative offsets in ioctl" }, { "cve": "CVE-2009-3620", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2009-10-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "529597" } ], "notes": [ { "category": "description", "text": "The ATI Rage 128 (aka r128) driver in the Linux kernel before 2.6.31-git11 does not properly verify Concurrent Command Engine (CCE) state initialization, which allows local users to cause a denial of service (NULL pointer dereference and system crash) or possibly gain privileges via unspecified ioctl calls.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-3620" }, { "category": "external", "summary": "RHBZ#529597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=529597" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-3620", "url": "https://www.cve.org/CVERecord?id=CVE-2009-3620" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-3620" } ], "release_date": "2009-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-12T09:36:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0882" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: r128 IOCTL NULL pointer dereferences when CCE state is uninitialised" }, { "cve": "CVE-2009-4536", "discovery_date": "2009-12-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "552126" } ], "notes": [ { "category": "description", "text": "drivers/net/e1000/e1000_main.c in the e1000 driver in the Linux kernel 2.6.32.3 and earlier handles Ethernet frames that exceed the MTU by processing certain trailing payload data as if it were a complete frame, which allows remote attackers to bypass packet filters via a large packet with a crafted payload. NOTE: this vulnerability exists because of an incorrect fix for CVE-2009-1385.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: e1000 issue reported at 26c3", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2009-4536" }, { "category": "external", "summary": "RHBZ#552126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=552126" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2009-4536", "url": "https://www.cve.org/CVERecord?id=CVE-2009-4536" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536", "url": "https://nvd.nist.gov/vuln/detail/CVE-2009-4536" } ], "release_date": "2009-12-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-12T09:36:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0882" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.8, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:L/Au:N/C:N/I:P/A:C", "version": "2.0" }, "products": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: e1000 issue reported at 26c3" }, { "cve": "CVE-2010-1188", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-03-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "577711" } ], "notes": [ { "category": "description", "text": "Use-after-free vulnerability in net/ipv4/tcp_input.c in the Linux kernel 2.6 before 2.6.20, when IPV6_RECVPKTINFO is set on a listening socket, allows remote attackers to cause a denial of service (kernel panic) via a SYN packet while the socket is in a listening (TCP_LISTEN) state, which is not properly handled and causes the skb structure to be freed.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ipv6: skb is unexpectedly freed", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise MRG, as it was fixed since version v2.6.20-rc6.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-1188" }, { "category": "external", "summary": "RHBZ#577711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=577711" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-1188", "url": "https://www.cve.org/CVERecord?id=CVE-2010-1188" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-1188", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-1188" } ], "release_date": "2007-01-23T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-12T09:36:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0882" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: ipv6: skb is unexpectedly freed" }, { "acknowledgments": [ { "names": [ "X.Org security team" ] }, { "names": [ "Rafal Wojtczuk" ], "summary": "Acknowledged by upstream." } ], "cve": "CVE-2010-2240", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "606611" } ], "notes": [ { "category": "description", "text": "The do_anonymous_page function in mm/memory.c in the Linux kernel before 2.6.27.52, 2.6.32.x before 2.6.32.19, 2.6.34.x before 2.6.34.4, and 2.6.35.x before 2.6.35.2 does not properly separate the stack and the heap, which allows context-dependent attackers to execute arbitrary code by writing to the bottom page of a shared memory segment, as demonstrated by a memory-exhaustion attack against the X.Org X server.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: mm: keep a guard page below a grow-down stack segment", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2240" }, { "category": "external", "summary": "RHBZ#606611", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=606611" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2240", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2240" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2240", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2240" } ], "release_date": "2010-08-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-12T09:36:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0882" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: mm: keep a guard page below a grow-down stack segment" }, { "acknowledgments": [ { "names": [ "Ben Hawkes" ] } ], "cve": "CVE-2010-3081", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "634457" } ], "notes": [ { "category": "description", "text": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow", "title": "Vulnerability summary" }, { "category": "other", "text": "More information can be found in this kbase: https://access.redhat.com/kb/docs/DOC-40265.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3081" }, { "category": "external", "summary": "RHBZ#634457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3081", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-12T09:36:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0882" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "3AS-ELS:kernel-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-0:2.4.21-66.EL.src", "3AS-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3AS-ELS:kernel-source-0:2.4.21-66.EL.i386", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3AS-ELS:kernel-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-0:2.4.21-66.EL.src", "3ES-ELS:kernel-BOOT-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-debuginfo-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-doc-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-hugemem-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-hugemem-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-smp-unsupported-0:2.4.21-66.EL.i686", "3ES-ELS:kernel-source-0:2.4.21-66.EL.i386", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.athlon", "3ES-ELS:kernel-unsupported-0:2.4.21-66.EL.i686" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow" } ] }
rhsa-2010_0719
Vulnerability from csaf_redhat
Published
2010-09-28 12:49
Modified
2024-11-22 03:46
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages that fix one security issue are now available for
Red Hat Enterprise Linux 4.7 Extended Update Support.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issue:
* The compat_alloc_user_space() function in the Linux kernel 32/64-bit
compatibility layer implementation was missing sanity checks. This function
could be abused in other areas of the Linux kernel if its length argument
can be controlled from user-space. On 64-bit systems, a local, unprivileged
user could use this flaw to escalate their privileges. (CVE-2010-3081,
Important)
Red Hat would like to thank Ben Hawkes for reporting this issue.
Refer to Knowledgebase article DOC-40265 for further details:
https://access.redhat.com/kb/docs/DOC-40265
Users should upgrade to these updated packages, which contain a backported
patch to correct this issue. The system must be rebooted for this update to
take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix one security issue are now available for\nRed Hat Enterprise Linux 4.7 Extended Update Support.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issue:\n\n* The compat_alloc_user_space() function in the Linux kernel 32/64-bit\ncompatibility layer implementation was missing sanity checks. This function\ncould be abused in other areas of the Linux kernel if its length argument\ncan be controlled from user-space. On 64-bit systems, a local, unprivileged\nuser could use this flaw to escalate their privileges. (CVE-2010-3081,\nImportant)\n\nRed Hat would like to thank Ben Hawkes for reporting this issue.\n\nRefer to Knowledgebase article DOC-40265 for further details:\nhttps://access.redhat.com/kb/docs/DOC-40265\n\nUsers should upgrade to these updated packages, which contain a backported\npatch to correct this issue. The system must be rebooted for this update to\ntake effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0719", "url": "https://access.redhat.com/errata/RHSA-2010:0719" }, { "category": "external", "summary": "http://www.redhat.com/security/updates/classification/#important", "url": "http://www.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/kb/docs/DOC-40265", "url": "https://access.redhat.com/kb/docs/DOC-40265" }, { "category": "external", "summary": "634457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0719.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-22T03:46:57+00:00", "generator": { "date": "2024-11-22T03:46:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0719", "initial_release_date": "2010-09-28T12:49:00+00:00", "revision_history": [ { "date": "2010-09-28T12:49:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-09-28T08:52:16+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:46:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS EUS (v. 4.7)", "product": { "name": "Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:4.7::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES EUS (v. 4.7)", "product": { "name": "Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:4.7::es" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-hugemem-devel-0:2.6.9-78.0.33.EL.i686", "product": { "name": "kernel-hugemem-devel-0:2.6.9-78.0.33.EL.i686", "product_id": "kernel-hugemem-devel-0:2.6.9-78.0.33.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-78.0.33.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-78.0.33.EL.i686", "product": { "name": "kernel-xenU-devel-0:2.6.9-78.0.33.EL.i686", "product_id": "kernel-xenU-devel-0:2.6.9-78.0.33.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-78.0.33.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-78.0.33.EL.i686", "product": { "name": "kernel-smp-0:2.6.9-78.0.33.EL.i686", "product_id": "kernel-smp-0:2.6.9-78.0.33.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-78.0.33.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-78.0.33.EL.i686", "product": { "name": "kernel-xenU-0:2.6.9-78.0.33.EL.i686", "product_id": "kernel-xenU-0:2.6.9-78.0.33.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-78.0.33.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-78.0.33.EL.i686", "product": { "name": "kernel-0:2.6.9-78.0.33.EL.i686", "product_id": "kernel-0:2.6.9-78.0.33.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.33.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.i686", "product": { "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.i686", "product_id": "kernel-debuginfo-0:2.6.9-78.0.33.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.33.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-78.0.33.EL.i686", "product": { "name": "kernel-devel-0:2.6.9-78.0.33.EL.i686", "product_id": "kernel-devel-0:2.6.9-78.0.33.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.33.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.6.9-78.0.33.EL.i686", "product": { "name": "kernel-hugemem-0:2.6.9-78.0.33.EL.i686", "product_id": "kernel-hugemem-0:2.6.9-78.0.33.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-78.0.33.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-78.0.33.EL.i686", "product": { "name": "kernel-smp-devel-0:2.6.9-78.0.33.EL.i686", "product_id": "kernel-smp-devel-0:2.6.9-78.0.33.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-78.0.33.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-78.0.33.EL.x86_64", "product": { "name": "kernel-xenU-devel-0:2.6.9-78.0.33.EL.x86_64", "product_id": "kernel-xenU-devel-0:2.6.9-78.0.33.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-78.0.33.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-78.0.33.EL.x86_64", "product": { "name": "kernel-smp-0:2.6.9-78.0.33.EL.x86_64", "product_id": "kernel-smp-0:2.6.9-78.0.33.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-78.0.33.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-78.0.33.EL.x86_64", "product": { "name": "kernel-xenU-0:2.6.9-78.0.33.EL.x86_64", "product_id": "kernel-xenU-0:2.6.9-78.0.33.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-78.0.33.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-78.0.33.EL.x86_64", "product": { "name": "kernel-0:2.6.9-78.0.33.EL.x86_64", "product_id": "kernel-0:2.6.9-78.0.33.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.33.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.x86_64", "product_id": "kernel-debuginfo-0:2.6.9-78.0.33.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.33.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-78.0.33.EL.x86_64", "product": { "name": "kernel-devel-0:2.6.9-78.0.33.EL.x86_64", "product_id": "kernel-devel-0:2.6.9-78.0.33.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.33.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-78.0.33.EL.x86_64", "product": { "name": "kernel-largesmp-0:2.6.9-78.0.33.EL.x86_64", "product_id": "kernel-largesmp-0:2.6.9-78.0.33.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-78.0.33.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-78.0.33.EL.x86_64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.33.EL.x86_64", "product_id": "kernel-largesmp-devel-0:2.6.9-78.0.33.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-78.0.33.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-78.0.33.EL.x86_64", "product": { "name": "kernel-smp-devel-0:2.6.9-78.0.33.EL.x86_64", "product_id": "kernel-smp-devel-0:2.6.9-78.0.33.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-78.0.33.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.9-78.0.33.EL.noarch", "product": { "name": "kernel-doc-0:2.6.9-78.0.33.EL.noarch", "product_id": "kernel-doc-0:2.6.9-78.0.33.EL.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-78.0.33.EL?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-78.0.33.EL.ia64", "product": { "name": "kernel-0:2.6.9-78.0.33.EL.ia64", "product_id": "kernel-0:2.6.9-78.0.33.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.33.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.ia64", "product_id": "kernel-debuginfo-0:2.6.9-78.0.33.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.33.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-78.0.33.EL.ia64", "product": { "name": "kernel-devel-0:2.6.9-78.0.33.EL.ia64", "product_id": "kernel-devel-0:2.6.9-78.0.33.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.33.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-78.0.33.EL.ia64", "product": { "name": "kernel-largesmp-0:2.6.9-78.0.33.EL.ia64", "product_id": "kernel-largesmp-0:2.6.9-78.0.33.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-78.0.33.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ia64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ia64", "product_id": "kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-78.0.33.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-78.0.33.EL.src", "product": { "name": "kernel-0:2.6.9-78.0.33.EL.src", "product_id": "kernel-0:2.6.9-78.0.33.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.33.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-78.0.33.EL.ppc64", "product": { "name": "kernel-0:2.6.9-78.0.33.EL.ppc64", "product_id": "kernel-0:2.6.9-78.0.33.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.33.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64", "product_id": "kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.33.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-78.0.33.EL.ppc64", "product": { "name": "kernel-devel-0:2.6.9-78.0.33.EL.ppc64", "product_id": "kernel-devel-0:2.6.9-78.0.33.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.33.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-78.0.33.EL.ppc64", "product": { "name": "kernel-largesmp-0:2.6.9-78.0.33.EL.ppc64", "product_id": "kernel-largesmp-0:2.6.9-78.0.33.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-78.0.33.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ppc64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ppc64", "product_id": "kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-78.0.33.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-78.0.33.EL.ppc64iseries", "product": { "name": "kernel-0:2.6.9-78.0.33.EL.ppc64iseries", "product_id": "kernel-0:2.6.9-78.0.33.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.33.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.33.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-78.0.33.EL.ppc64iseries", "product": { "name": "kernel-devel-0:2.6.9-78.0.33.EL.ppc64iseries", "product_id": "kernel-devel-0:2.6.9-78.0.33.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.33.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-78.0.33.EL.s390x", "product": { "name": "kernel-0:2.6.9-78.0.33.EL.s390x", "product_id": "kernel-0:2.6.9-78.0.33.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.33.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.s390x", "product_id": "kernel-debuginfo-0:2.6.9-78.0.33.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.33.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-78.0.33.EL.s390x", "product": { "name": "kernel-devel-0:2.6.9-78.0.33.EL.s390x", "product_id": "kernel-devel-0:2.6.9-78.0.33.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.33.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-78.0.33.EL.s390", "product": { "name": "kernel-0:2.6.9-78.0.33.EL.s390", "product_id": "kernel-0:2.6.9-78.0.33.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-78.0.33.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.s390", "product": { "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.s390", "product_id": "kernel-debuginfo-0:2.6.9-78.0.33.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-78.0.33.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-78.0.33.EL.s390", "product": { "name": "kernel-devel-0:2.6.9-78.0.33.EL.s390", "product_id": "kernel-devel-0:2.6.9-78.0.33.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-78.0.33.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.33.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.i686" }, "product_reference": "kernel-0:2.6.9-78.0.33.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.33.EL.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.ia64" }, "product_reference": "kernel-0:2.6.9-78.0.33.EL.ia64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.33.EL.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-78.0.33.EL.ppc64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.33.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-78.0.33.EL.ppc64iseries", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.33.EL.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.s390" }, "product_reference": "kernel-0:2.6.9-78.0.33.EL.s390", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.33.EL.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.s390x" }, "product_reference": "kernel-0:2.6.9-78.0.33.EL.s390x", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.33.EL.src as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.src" }, "product_reference": "kernel-0:2.6.9-78.0.33.EL.src", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.33.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-78.0.33.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.33.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.33.EL.ia64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64iseries", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.33.EL.s390", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.33.EL.s390x", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.33.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.33.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-78.0.33.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.33.EL.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-78.0.33.EL.ia64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.33.EL.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-78.0.33.EL.ppc64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.33.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-78.0.33.EL.ppc64iseries", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.33.EL.s390 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-78.0.33.EL.s390", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.33.EL.s390x as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-78.0.33.EL.s390x", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.33.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-78.0.33.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-78.0.33.EL.noarch as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-doc-0:2.6.9-78.0.33.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-78.0.33.EL.noarch", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-78.0.33.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.33.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-78.0.33.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-78.0.33.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.33.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-78.0.33.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-78.0.33.EL.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.33.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-78.0.33.EL.ia64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-78.0.33.EL.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.33.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-78.0.33.EL.ppc64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-78.0.33.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.33.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-78.0.33.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ia64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ia64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ppc64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ppc64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.33.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.33.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.33.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-78.0.33.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.33.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-78.0.33.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-78.0.33.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.33.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-78.0.33.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-78.0.33.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.33.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-78.0.33.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-78.0.33.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.33.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-78.0.33.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-78.0.33.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.33.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-78.0.33.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-78.0.33.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.33.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-78.0.33.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-78.0.33.EL.i686 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.33.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.33.EL.i686", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-78.0.33.EL.x86_64 as a component of Red Hat Enterprise Linux AS EUS (v. 4.7)", "product_id": "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.33.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.33.EL.x86_64", "relates_to_product_reference": "4AS-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.33.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.i686" }, "product_reference": "kernel-0:2.6.9-78.0.33.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.33.EL.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.ia64" }, "product_reference": "kernel-0:2.6.9-78.0.33.EL.ia64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.33.EL.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-78.0.33.EL.ppc64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.33.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-78.0.33.EL.ppc64iseries", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.33.EL.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.s390" }, "product_reference": "kernel-0:2.6.9-78.0.33.EL.s390", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.33.EL.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.s390x" }, "product_reference": "kernel-0:2.6.9-78.0.33.EL.s390x", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.33.EL.src as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.src" }, "product_reference": "kernel-0:2.6.9-78.0.33.EL.src", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-78.0.33.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-78.0.33.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.33.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.33.EL.ia64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64iseries", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.33.EL.s390", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.33.EL.s390x", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-78.0.33.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-78.0.33.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.33.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-78.0.33.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.33.EL.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-78.0.33.EL.ia64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.33.EL.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-78.0.33.EL.ppc64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.33.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-78.0.33.EL.ppc64iseries", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.33.EL.s390 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-78.0.33.EL.s390", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.33.EL.s390x as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-78.0.33.EL.s390x", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-78.0.33.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-78.0.33.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-78.0.33.EL.noarch as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-doc-0:2.6.9-78.0.33.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-78.0.33.EL.noarch", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-78.0.33.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.33.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-78.0.33.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-78.0.33.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.33.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-78.0.33.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-78.0.33.EL.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.33.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-78.0.33.EL.ia64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-78.0.33.EL.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.33.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-78.0.33.EL.ppc64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-78.0.33.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.33.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-78.0.33.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ia64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ia64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ppc64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ppc64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-78.0.33.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.33.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-78.0.33.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-78.0.33.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.33.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-78.0.33.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-78.0.33.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.33.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-78.0.33.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-78.0.33.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.33.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-78.0.33.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-78.0.33.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.33.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-78.0.33.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-78.0.33.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.33.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-78.0.33.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-78.0.33.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.33.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-78.0.33.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-78.0.33.EL.i686 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.33.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.33.EL.i686", "relates_to_product_reference": "4ES-4.7.z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-78.0.33.EL.x86_64 as a component of Red Hat Enterprise Linux ES EUS (v. 4.7)", "product_id": "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.33.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-78.0.33.EL.x86_64", "relates_to_product_reference": "4ES-4.7.z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ben Hawkes" ] } ], "cve": "CVE-2010-3081", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "634457" } ], "notes": [ { "category": "description", "text": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow", "title": "Vulnerability summary" }, { "category": "other", "text": "More information can be found in this kbase: https://access.redhat.com/kb/docs/DOC-40265.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.ia64", "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.ppc64", "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.ppc64iseries", "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.s390", "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.s390x", "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.src", "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.x86_64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.ia64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64iseries", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.s390", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.s390x", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.x86_64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.ia64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.ppc64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.ppc64iseries", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.s390", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.s390x", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.x86_64", "4AS-4.7.z:kernel-doc-0:2.6.9-78.0.33.EL.noarch", "4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.33.EL.ia64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.33.EL.ppc64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.33.EL.x86_64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ia64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ppc64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.33.EL.x86_64", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.33.EL.x86_64", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.33.EL.x86_64", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.33.EL.x86_64", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.ia64", "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.ppc64", "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.ppc64iseries", "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.s390", "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.s390x", "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.src", "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.ia64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64iseries", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.s390", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.s390x", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.ia64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.ppc64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.ppc64iseries", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.s390", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.s390x", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-doc-0:2.6.9-78.0.33.EL.noarch", "4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.33.EL.ia64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.33.EL.ppc64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ia64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ppc64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.33.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3081" }, { "category": "external", "summary": "RHBZ#634457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3081", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-09-28T12:49:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.ia64", "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.ppc64", "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.ppc64iseries", "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.s390", "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.s390x", "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.src", "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.x86_64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.ia64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64iseries", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.s390", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.s390x", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.x86_64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.ia64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.ppc64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.ppc64iseries", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.s390", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.s390x", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.x86_64", "4AS-4.7.z:kernel-doc-0:2.6.9-78.0.33.EL.noarch", "4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.33.EL.ia64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.33.EL.ppc64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.33.EL.x86_64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ia64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ppc64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.33.EL.x86_64", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.33.EL.x86_64", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.33.EL.x86_64", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.33.EL.x86_64", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.ia64", "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.ppc64", "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.ppc64iseries", "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.s390", "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.s390x", "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.src", "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.ia64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64iseries", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.s390", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.s390x", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.ia64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.ppc64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.ppc64iseries", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.s390", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.s390x", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-doc-0:2.6.9-78.0.33.EL.noarch", "4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.33.EL.ia64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.33.EL.ppc64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ia64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ppc64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.33.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0719" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.ia64", "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.ppc64", "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.ppc64iseries", "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.s390", "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.s390x", "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.src", "4AS-4.7.z:kernel-0:2.6.9-78.0.33.EL.x86_64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.ia64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64iseries", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.s390", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.s390x", "4AS-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.x86_64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.ia64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.ppc64", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.ppc64iseries", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.s390", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.s390x", "4AS-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.x86_64", "4AS-4.7.z:kernel-doc-0:2.6.9-78.0.33.EL.noarch", "4AS-4.7.z:kernel-hugemem-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.33.EL.ia64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.33.EL.ppc64", "4AS-4.7.z:kernel-largesmp-0:2.6.9-78.0.33.EL.x86_64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ia64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ppc64", "4AS-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.33.EL.x86_64", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-smp-0:2.6.9-78.0.33.EL.x86_64", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-smp-devel-0:2.6.9-78.0.33.EL.x86_64", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-xenU-0:2.6.9-78.0.33.EL.x86_64", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.33.EL.i686", "4AS-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.ia64", "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.ppc64", "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.ppc64iseries", "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.s390", "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.s390x", "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.src", "4ES-4.7.z:kernel-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.ia64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.ppc64iseries", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.s390", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.s390x", "4ES-4.7.z:kernel-debuginfo-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.ia64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.ppc64", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.ppc64iseries", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.s390", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.s390x", "4ES-4.7.z:kernel-devel-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-doc-0:2.6.9-78.0.33.EL.noarch", "4ES-4.7.z:kernel-hugemem-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-hugemem-devel-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.33.EL.ia64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.33.EL.ppc64", "4ES-4.7.z:kernel-largesmp-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ia64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.33.EL.ppc64", "4ES-4.7.z:kernel-largesmp-devel-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-smp-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-smp-devel-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-xenU-0:2.6.9-78.0.33.EL.x86_64", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.33.EL.i686", "4ES-4.7.z:kernel-xenU-devel-0:2.6.9-78.0.33.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow" } ] }
rhsa-2010_0842
Vulnerability from csaf_redhat
Published
2010-11-10 19:00
Modified
2024-11-22 03:55
Summary
Red Hat Security Advisory: kernel security and bug fix update
Notes
Topic
Updated kernel packages that fix multiple security issues and several bugs
are now available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
[Updated 22 November 2010]
The packages list in this erratum has been updated to include four missing
debuginfo-common packages (one per architecture). No changes have been made
to the original packages.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issues:
* Missing sanity checks in the Intel i915 driver in the Linux kernel could
allow a local, unprivileged user to escalate their privileges.
(CVE-2010-2962, Important)
* compat_alloc_user_space() in the Linux kernel 32/64-bit compatibility
layer implementation was missing sanity checks. This function could be
abused in other areas of the Linux kernel if its length argument can be
controlled from user-space. On 64-bit systems, a local, unprivileged user
could use this flaw to escalate their privileges. (CVE-2010-3081,
Important)
* A buffer overflow flaw in niu_get_ethtool_tcam_all() in the niu Ethernet
driver in the Linux kernel, could allow a local user to cause a denial of
service or escalate their privileges. (CVE-2010-3084, Important)
* A flaw in the IA32 system call emulation provided in 64-bit Linux kernels
could allow a local user to escalate their privileges. (CVE-2010-3301,
Important)
* A flaw in sctp_packet_config() in the Linux kernel's Stream Control
Transmission Protocol (SCTP) implementation could allow a remote attacker
to cause a denial of service. (CVE-2010-3432, Important)
* A missing integer overflow check in snd_ctl_new() in the Linux kernel's
sound subsystem could allow a local, unprivileged user on a 32-bit system
to cause a denial of service or escalate their privileges. (CVE-2010-3442,
Important)
* A flaw was found in sctp_auth_asoc_get_hmac() in the Linux kernel's SCTP
implementation. When iterating through the hmac_ids array, it did not reset
the last id element if it was out of range. This could allow a remote
attacker to cause a denial of service. (CVE-2010-3705, Important)
* A function in the Linux kernel's Reliable Datagram Sockets (RDS) protocol
implementation was missing sanity checks, which could allow a local,
unprivileged user to escalate their privileges. (CVE-2010-3904, Important)
* A flaw in drm_ioctl() in the Linux kernel's Direct Rendering Manager
(DRM) implementation could allow a local, unprivileged user to cause an
information leak. (CVE-2010-2803, Moderate)
* It was found that wireless drivers might not always clear allocated
buffers when handling a driver-specific IOCTL information request. A local
user could trigger this flaw to cause an information leak. (CVE-2010-2955,
Moderate)
* A NULL pointer dereference flaw in ftrace_regex_lseek() in the Linux
kernel's ftrace implementation could allow a local, unprivileged user to
cause a denial of service. Note: The debugfs file system must be mounted
locally to exploit this issue. It is not mounted by default.
(CVE-2010-3079, Moderate)
* A flaw in the Linux kernel's packet writing driver could be triggered
via the PKT_CTRL_CMD_STATUS IOCTL request, possibly allowing a local,
unprivileged user with access to "/dev/pktcdvd/control" to cause an
information leak. Note: By default, only users in the cdrom group have
access to "/dev/pktcdvd/control". (CVE-2010-3437, Moderate)
* A flaw was found in the way KVM (Kernel-based Virtual Machine) handled
the reloading of fs and gs segment registers when they had invalid
selectors. A privileged host user with access to "/dev/kvm" could use this
flaw to crash the host. (CVE-2010-3698, Moderate)
Red Hat would like to thank Kees Cook for reporting CVE-2010-2962 and
CVE-2010-2803; Ben Hawkes for reporting CVE-2010-3081 and CVE-2010-3301;
Dan Rosenberg for reporting CVE-2010-3442, CVE-2010-3705, CVE-2010-3904,
and CVE-2010-3437; and Robert Swiecki for reporting CVE-2010-3079.
This update also fixes several bugs. Documentation for these bug fixes will
be available shortly from the Technical Notes document linked to in the
References section.
Users should upgrade to these updated packages, which contain backported
patches to correct these issues. The system must be rebooted for this
update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.\n\n[Updated 22 November 2010]\nThe packages list in this erratum has been updated to include four missing\ndebuginfo-common packages (one per architecture). No changes have been made\nto the original packages.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* Missing sanity checks in the Intel i915 driver in the Linux kernel could\nallow a local, unprivileged user to escalate their privileges.\n(CVE-2010-2962, Important)\n\n* compat_alloc_user_space() in the Linux kernel 32/64-bit compatibility\nlayer implementation was missing sanity checks. This function could be\nabused in other areas of the Linux kernel if its length argument can be\ncontrolled from user-space. On 64-bit systems, a local, unprivileged user\ncould use this flaw to escalate their privileges. (CVE-2010-3081,\nImportant)\n\n* A buffer overflow flaw in niu_get_ethtool_tcam_all() in the niu Ethernet\ndriver in the Linux kernel, could allow a local user to cause a denial of\nservice or escalate their privileges. (CVE-2010-3084, Important)\n\n* A flaw in the IA32 system call emulation provided in 64-bit Linux kernels\ncould allow a local user to escalate their privileges. (CVE-2010-3301,\nImportant)\n\n* A flaw in sctp_packet_config() in the Linux kernel\u0027s Stream Control\nTransmission Protocol (SCTP) implementation could allow a remote attacker\nto cause a denial of service. (CVE-2010-3432, Important)\n\n* A missing integer overflow check in snd_ctl_new() in the Linux kernel\u0027s\nsound subsystem could allow a local, unprivileged user on a 32-bit system\nto cause a denial of service or escalate their privileges. (CVE-2010-3442,\nImportant)\n\n* A flaw was found in sctp_auth_asoc_get_hmac() in the Linux kernel\u0027s SCTP\nimplementation. When iterating through the hmac_ids array, it did not reset\nthe last id element if it was out of range. This could allow a remote\nattacker to cause a denial of service. (CVE-2010-3705, Important)\n\n* A function in the Linux kernel\u0027s Reliable Datagram Sockets (RDS) protocol\nimplementation was missing sanity checks, which could allow a local,\nunprivileged user to escalate their privileges. (CVE-2010-3904, Important)\n\n* A flaw in drm_ioctl() in the Linux kernel\u0027s Direct Rendering Manager\n(DRM) implementation could allow a local, unprivileged user to cause an\ninformation leak. (CVE-2010-2803, Moderate)\n\n* It was found that wireless drivers might not always clear allocated\nbuffers when handling a driver-specific IOCTL information request. A local\nuser could trigger this flaw to cause an information leak. (CVE-2010-2955,\nModerate)\n\n* A NULL pointer dereference flaw in ftrace_regex_lseek() in the Linux\nkernel\u0027s ftrace implementation could allow a local, unprivileged user to\ncause a denial of service. Note: The debugfs file system must be mounted\nlocally to exploit this issue. It is not mounted by default.\n(CVE-2010-3079, Moderate)\n\n* A flaw in the Linux kernel\u0027s packet writing driver could be triggered\nvia the PKT_CTRL_CMD_STATUS IOCTL request, possibly allowing a local,\nunprivileged user with access to \"/dev/pktcdvd/control\" to cause an\ninformation leak. Note: By default, only users in the cdrom group have\naccess to \"/dev/pktcdvd/control\". (CVE-2010-3437, Moderate)\n\n* A flaw was found in the way KVM (Kernel-based Virtual Machine) handled\nthe reloading of fs and gs segment registers when they had invalid\nselectors. A privileged host user with access to \"/dev/kvm\" could use this\nflaw to crash the host. (CVE-2010-3698, Moderate)\n\nRed Hat would like to thank Kees Cook for reporting CVE-2010-2962 and\nCVE-2010-2803; Ben Hawkes for reporting CVE-2010-3081 and CVE-2010-3301;\nDan Rosenberg for reporting CVE-2010-3442, CVE-2010-3705, CVE-2010-3904,\nand CVE-2010-3437; and Robert Swiecki for reporting CVE-2010-3079.\n\nThis update also fixes several bugs. Documentation for these bug fixes will\nbe available shortly from the Technical Notes document linked to in the\nReferences section.\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues. The system must be rebooted for this\nupdate to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0842", "url": "https://access.redhat.com/errata/RHSA-2010:0842" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html-single/Technical_Notes/index.html#RHSA-2010:0842", "url": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html-single/Technical_Notes/index.html#RHSA-2010:0842" }, { "category": "external", "summary": "621435", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621435" }, { "category": "external", "summary": "628434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628434" }, { "category": "external", "summary": "631623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=631623" }, { "category": "external", "summary": "632069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=632069" }, { "category": "external", "summary": "632292", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=632292" }, { "category": "external", "summary": "633864", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=633864" }, { "category": "external", "summary": "633865", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=633865" }, { "category": "external", "summary": "633964", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=633964" }, { "category": "external", "summary": "633966", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=633966" }, { "category": "external", "summary": "634449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634449" }, { "category": "external", "summary": "634457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "category": "external", "summary": "634973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634973" }, { "category": "external", "summary": "634984", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634984" }, { "category": "external", "summary": "635951", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=635951" }, { "category": "external", "summary": "636116", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=636116" }, { "category": "external", "summary": "637087", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637087" }, { "category": "external", "summary": "637675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637675" }, { "category": "external", "summary": "637688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637688" }, { "category": "external", "summary": "638085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638085" }, { "category": "external", "summary": "638478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638478" }, { "category": "external", "summary": "638973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638973" }, { "category": "external", "summary": "639412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639412" }, { "category": "external", "summary": "639879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639879" }, { "category": "external", "summary": "640036", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640036" }, { "category": "external", "summary": "641258", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641258" }, { "category": "external", "summary": "641454", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641454" }, { "category": "external", "summary": "641455", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641455" }, { "category": "external", "summary": "641456", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641456" }, { "category": "external", "summary": "641457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641457" }, { "category": "external", "summary": "641458", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641458" }, { "category": "external", "summary": "641459", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641459" }, { "category": "external", "summary": "641460", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641460" }, { "category": "external", "summary": "641483", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641483" }, { "category": "external", "summary": "641907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641907" }, { "category": "external", "summary": "642043", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642043" }, { "category": "external", "summary": "642045", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642045" }, { "category": "external", "summary": "642465", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642465" }, { "category": "external", "summary": "642679", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642679" }, { "category": "external", "summary": "642680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642680" }, { "category": "external", "summary": "642896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642896" }, { "category": "external", "summary": "644037", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=644037" }, { "category": "external", "summary": "644038", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=644038" }, { "category": "external", "summary": "644636", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=644636" }, { "category": "external", "summary": "644926", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=644926" }, { "category": "external", "summary": "646994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=646994" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0842.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T03:55:57+00:00", "generator": { "date": "2024-11-22T03:55:57+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0842", "initial_release_date": "2010-11-10T19:00:00+00:00", "revision_history": [ { "date": "2010-11-10T19:00:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-11-22T14:34:20+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:55:57+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-71.7.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-71.7.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-71.7.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-71.7.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-71.7.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-71.7.1.el6.x86_64", "product": { "name": "kernel-0:2.6.32-71.7.1.el6.x86_64", "product_id": "kernel-0:2.6.32-71.7.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-71.7.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-71.7.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-71.7.1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "perf-0:2.6.32-71.7.1.el6.noarch", "product": { "name": "perf-0:2.6.32-71.7.1.el6.noarch", "product_id": "perf-0:2.6.32-71.7.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-71.7.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-71.7.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-71.7.1.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-71.7.1.el6.noarch", "product_id": "kernel-doc-0:2.6.32-71.7.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-71.7.1.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-71.7.1.el6.src", "product": { "name": "kernel-0:2.6.32-71.7.1.el6.src", "product_id": "kernel-0:2.6.32-71.7.1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-71.7.1.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.32-71.7.1.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.i686", "product_id": "kernel-devel-0:2.6.32-71.7.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-71.7.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-71.7.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-71.7.1.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.i686", "product_id": "kernel-debug-0:2.6.32-71.7.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-71.7.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-71.7.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-71.7.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-71.7.1.el6.i686", "product": { "name": "kernel-0:2.6.32-71.7.1.el6.i686", "product_id": "kernel-0:2.6.32-71.7.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-71.7.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-71.7.1.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.i686", "product_id": "kernel-headers-0:2.6.32-71.7.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-71.7.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-71.7.1.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-71.7.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-71.7.1.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.s390x", "product_id": "kernel-devel-0:2.6.32-71.7.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-71.7.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-71.7.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-71.7.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-71.7.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-71.7.1.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.s390x", "product_id": "kernel-debug-0:2.6.32-71.7.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-71.7.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-71.7.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-71.7.1.el6.s390x", "product": { "name": "kernel-0:2.6.32-71.7.1.el6.s390x", "product_id": "kernel-0:2.6.32-71.7.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-71.7.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-71.7.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-71.7.1.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.s390x", "product_id": "kernel-headers-0:2.6.32-71.7.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-71.7.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-71.7.1.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-71.7.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-71.7.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-71.7.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-71.7.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-71.7.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-71.7.1.el6.ppc64", "product": { "name": "kernel-0:2.6.32-71.7.1.el6.ppc64", "product_id": "kernel-0:2.6.32-71.7.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-71.7.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-71.7.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-71.7.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-71.7.1.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-0:2.6.32-71.7.1.el6.src" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.src", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-71.7.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-71.7.1.el6.noarch", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-71.7.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-71.7.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:perf-0:2.6.32-71.7.1.el6.noarch" }, "product_reference": "perf-0:2.6.32-71.7.1.el6.noarch", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.src", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-71.7.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-71.7.1.el6.noarch", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-71.7.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-71.7.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch" }, "product_reference": "perf-0:2.6.32-71.7.1.el6.noarch", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-0:2.6.32-71.7.1.el6.src" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-71.7.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-71.7.1.el6.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-71.7.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-71.7.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:perf-0:2.6.32-71.7.1.el6.noarch" }, "product_reference": "perf-0:2.6.32-71.7.1.el6.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-0:2.6.32-71.7.1.el6.src" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-71.7.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-71.7.1.el6.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-71.7.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.7.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-71.7.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" }, "product_reference": "perf-0:2.6.32-71.7.1.el6.noarch", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Kees Cook" ] } ], "cve": "CVE-2010-2803", "discovery_date": "2010-08-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "621435" } ], "notes": [ { "category": "description", "text": "The drm_ioctl function in drivers/gpu/drm/drm_drv.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.27.53, 2.6.32.x before 2.6.32.21, 2.6.34.x before 2.6.34.6, and 2.6.35.x before 2.6.35.4 allows local users to obtain potentially sensitive information from kernel memory by requesting a large memory-allocation amount.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: drm ioctls infoleak", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 3, 4, 5 and Red Hat Enterprise MRG as they did not include\nsupport for GPU DRM.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2803" }, { "category": "external", "summary": "RHBZ#621435", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=621435" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2803", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2803" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2803", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2803" } ], "release_date": "2010-08-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.9, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: drm ioctls infoleak" }, { "cve": "CVE-2010-2955", "discovery_date": "2010-08-30T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "628434" } ], "notes": [ { "category": "description", "text": "The cfg80211_wext_giwessid function in net/wireless/wext-compat.c in the Linux kernel before 2.6.36-rc3-next-20100831 does not properly initialize certain structure members, which allows local users to leverage an off-by-one error in the ioctl_standard_iw_point function in net/wireless/wext-core.c, and obtain potentially sensitive information from kernel heap memory, via vectors involving an SIOCGIWESSID ioctl call that specifies a large buffer size.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: wireless: fix 64K kernel heap content leak via ioctl", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, and 5 as they did not backport the upstream commit 3d23e349 that had introduced the problem. A future update in Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2955" }, { "category": "external", "summary": "RHBZ#628434", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=628434" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2955", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2955" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2955", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2955" } ], "release_date": "2010-08-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: wireless: fix 64K kernel heap content leak via ioctl" }, { "acknowledgments": [ { "names": [ "Kees Cook" ] } ], "cve": "CVE-2010-2962", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-09-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "637688" } ], "notes": [ { "category": "description", "text": "drivers/gpu/drm/i915/i915_gem.c in the Graphics Execution Manager (GEM) in the Intel i915 driver in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.36 does not properly validate pointers to blocks of memory, which allows local users to write to arbitrary kernel memory locations, and consequently gain privileges, via crafted use of the ioctl interface, related to (1) pwrite and (2) pread operations.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: arbitrary kernel memory write via i915 GEM ioctl", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG did not include support for Graphics Execution Manager (GEM) in the i915 driver, and therefore are not affected by this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-2962" }, { "category": "external", "summary": "RHBZ#637688", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637688" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-2962", "url": "https://www.cve.org/CVERecord?id=CVE-2010-2962" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-2962", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-2962" } ], "release_date": "2010-10-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: arbitrary kernel memory write via i915 GEM ioctl" }, { "acknowledgments": [ { "names": [ "Robert Swiecki" ], "organization": "Google Security Team" } ], "cve": "CVE-2010-3079", "discovery_date": "2010-09-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "631623" } ], "notes": [ { "category": "description", "text": "kernel/trace/ftrace.c in the Linux kernel before 2.6.35.5, when debugfs is enabled, does not properly handle interaction between mutex possession and llseek operations, which allows local users to cause a denial of service (NULL pointer dereference and outage of all function tracing files) via an lseek call on a file descriptor associated with the set_ftrace_filter file.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ftrace NULL ptr deref", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and 5, as they do not include support for Ftrace. It did not affect Red Hat Enterprise MRG as it did not contain the upstream commit 8fc0c701 that introduced this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3079" }, { "category": "external", "summary": "RHBZ#631623", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=631623" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3079", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3079" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3079", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3079" } ], "release_date": "2010-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: ftrace NULL ptr deref" }, { "acknowledgments": [ { "names": [ "Ben Hawkes" ] } ], "cve": "CVE-2010-3081", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "634457" } ], "notes": [ { "category": "description", "text": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow", "title": "Vulnerability summary" }, { "category": "other", "text": "More information can be found in this kbase: https://access.redhat.com/kb/docs/DOC-40265.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3081" }, { "category": "external", "summary": "RHBZ#634457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3081", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow" }, { "cve": "CVE-2010-3084", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-09-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "632069" } ], "notes": [ { "category": "description", "text": "Buffer overflow in the niu_get_ethtool_tcam_all function in drivers/net/niu.c in the Linux kernel before 2.6.36-rc4 allows local users to cause a denial of service or possibly have unspecified other impact via the ETHTOOL_GRXCLSRLALL ethtool command.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: niu: buffer overflow for ETHTOOL_GRXCLSRLALL", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 3 and 4, as they do not include support for the Neptune Ethernet driver. It did not affect Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG, as they do not contain the upstream commit 2d96cf8c that introduced this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3084" }, { "category": "external", "summary": "RHBZ#632069", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=632069" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3084", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3084" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3084", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3084" } ], "release_date": "2010-09-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: niu: buffer overflow for ETHTOOL_GRXCLSRLALL" }, { "acknowledgments": [ { "names": [ "Ben Hawkes" ] } ], "cve": "CVE-2010-3301", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "634449" } ], "notes": [ { "category": "description", "text": "The IA32 system call emulation functionality in arch/x86/ia32/ia32entry.S in the Linux kernel before 2.6.36-rc4-git2 on the x86_64 platform does not zero extend the %eax register after the 32-bit entry path to ptrace is used, which allows local users to gain privileges by triggering an out-of-bounds access to the system call table using the %rax register. NOTE: this vulnerability exists because of a CVE-2007-4573 regression.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: IA32 System Call Entry Point Vulnerability", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 3, 4, 5, and Red Hat Enterprise MRG, as they do not contain the upstream commit d4d67150 that introduced this flaw.\n\nMore information can be found in this kbase: https://access.redhat.com/kb/docs/DOC-40330", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3301" }, { "category": "external", "summary": "RHBZ#634449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634449" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3301", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3301" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3301", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3301" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: IA32 System Call Entry Point Vulnerability" }, { "cve": "CVE-2010-3432", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-09-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "637675" } ], "notes": [ { "category": "description", "text": "The sctp_packet_config function in net/sctp/output.c in the Linux kernel before 2.6.35.6 performs extraneous initializations of packet data structures, which allows remote attackers to cause a denial of service (panic) via a certain sequence of SCTP traffic.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sctp: do not reset the packet during sctp_packet_config", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3 as it did not include support for SCTP. This was addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2010-0958.html and https://rhn.redhat.com/errata/RHSA-2010-0842.html. Future updates in Red Hat Enterprise Linux 4 and 5 may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3432" }, { "category": "external", "summary": "RHBZ#637675", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=637675" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3432", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3432" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3432", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3432" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" }, { "category": "workaround", "details": "For users that do not run applications that use SCTP, you can prevent the sctp module from being loaded by adding the following entry to the end of the /etc/modprobe.d/blacklist file:\n\nblacklist sctp\n\nThis way, the sctp module cannot be loaded accidentally, which may occur if an application that requires SCTP is started. A reboot is not necessary for this change to take effect.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: sctp: do not reset the packet during sctp_packet_config" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-3437", "discovery_date": "2010-09-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "638085" } ], "notes": [ { "category": "description", "text": "Integer signedness error in the pkt_find_dev_from_minor function in drivers/block/pktcdvd.c in the Linux kernel before 2.6.36-rc6 allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and system crash) via a crafted index value in a PKT_CTRL_CMD_STATUS ioctl call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: pktcdvd ioctl dev_minor missing range check", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3 and 4 did not include support for Packet writing layer for ATAPI and SCSI disc media devices, and therefore are not affected by this issue. The Linux kernel as shipped with Red Hat Enterprise Linux 5 and Red Hat Enterprise MRG only allow root access to the \"/dev/pktcdvd/control\" file, and therefore are also not affected by this issue.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3437" }, { "category": "external", "summary": "RHBZ#638085", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638085" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3437", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3437" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3437", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3437" } ], "release_date": "2010-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.7, "confidentialityImpact": "COMPLETE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:N/A:N", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: pktcdvd ioctl dev_minor missing range check" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-3442", "discovery_date": "2010-09-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "638478" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the snd_ctl_new function in sound/core/control.c in the Linux kernel before 2.6.36-rc5-next-20100929 allow local users to cause a denial of service (heap memory corruption) or possibly have unspecified other impact via a crafted (1) SNDRV_CTL_IOCTL_ELEM_ADD or (2) SNDRV_CTL_IOCTL_ELEM_REPLACE ioctl call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: prevent heap corruption in snd_ctl_new()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3442" }, { "category": "external", "summary": "RHBZ#638478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=638478" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3442", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3442" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3442", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3442" } ], "release_date": "2010-09-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: prevent heap corruption in snd_ctl_new()" }, { "cve": "CVE-2010-3698", "discovery_date": "2010-09-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "639879" } ], "notes": [ { "category": "description", "text": "The KVM implementation in the Linux kernel before 2.6.36 does not properly reload the FS and GS segment registers, which allows host OS users to cause a denial of service (host OS crash) via a KVM_RUN ioctl call in conjunction with a modified Local Descriptor Table (LDT).", "title": "Vulnerability description" }, { "category": "summary", "text": "kvm: invalid selector in fs/gs causes kernel panic", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3698" }, { "category": "external", "summary": "RHBZ#639879", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=639879" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3698", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3698" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3698", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3698" } ], "release_date": "2010-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 4.6, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kvm: invalid selector in fs/gs causes kernel panic" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-3705", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-10-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "640036" } ], "notes": [ { "category": "description", "text": "The sctp_auth_asoc_get_hmac function in net/sctp/auth.c in the Linux kernel before 2.6.36 does not properly validate the hmac_ids array of an SCTP peer, which allows remote attackers to cause a denial of service (memory corruption and panic) via a crafted value in the last element of this array.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sctp memory corruption in HMAC handling", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat is aware of this issue and is tracking it via the following bug:\nhttps://bugzilla.redhat.com/CVE-2010-3705.\n\nThis issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 3 as it did not include support for SCTP. It did not affect Red Hat Enterprise Linux 4 and 5 as it did not include upstream commit 1f485649 that introduced the problem. Future kernel updates in Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3705" }, { "category": "external", "summary": "RHBZ#640036", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640036" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3705", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3705" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3705", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3705" } ], "release_date": "2010-10-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 8.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:A/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: sctp memory corruption in HMAC handling" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ], "organization": "Virtual Security Research" } ], "cve": "CVE-2010-3904", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-10-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "642896" } ], "notes": [ { "category": "description", "text": "The rds_page_copy_user function in net/rds/page.c in the Reliable Datagram Sockets (RDS) protocol implementation in the Linux kernel before 2.6.36 does not properly validate addresses obtained from user space, which allows local users to gain privileges via crafted use of the sendmsg and recvmsg system calls.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: RDS sockets local privilege escalation", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and Red Hat Enterprise MRG did not include support for the RDS Protocol, and therefore are not affected by this issue. Updates for Red Hat Enterprise Linux 5 and 6 are available to address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3904" }, { "category": "external", "summary": "RHBZ#642896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=642896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3904", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3904" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3904", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3904" }, { "category": "external", "summary": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog" } ], "release_date": "2010-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-11-10T19:00:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0842" }, { "category": "workaround", "details": "For users that do not run applications that use RDS, you can prevent the rds module from being loaded by adding the following entry to the end of the /etc/modprobe.d/blacklist file:\n\nblacklist rds\n\nThis way, the rds module cannot be loaded accidentally, which may occur if an application that requires RDS is started. A reboot is not necessary for this change to take effect but do make sure the module is not loaded in the first place. You can verify that by running:\n\nlsmod | grep rds\n\nYou may also consider removing the CAP_SYS_MODULE capability from the current global capability set to prevent kernel modules from being loaded or unloaded. The CAP_SYS_MODULE has a capability number of 16 (see linux/capability.h). The default value has all the bits set. To remove this capability, you have to clear the 16th bit of the default 32-bit value, e.g. 0xffffff ^ (1 \u003c\u003c 16):\n\necho 0xFFFEFFFF \u003e /proc/sys/kernel/cap-bound", "product_ids": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-0:2.6.32-71.7.1.el6.src", "6Client:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Client:perf-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-0:2.6.32-71.7.1.el6.src", "6Server:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Server:perf-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.7.1.el6.src", "6Workstation:kernel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.7.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.7.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.7.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.7.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.7.1.el6.noarch" ] } ], "threats": [ { "category": "exploit_status", "date": "2023-05-12T00:00:00+00:00", "details": "CISA: https://www.cisa.gov/known-exploited-vulnerabilities-catalog" }, { "category": "impact", "details": "Important" } ], "title": "kernel: RDS sockets local privilege escalation" } ] }
rhsa-2010_0758
Vulnerability from csaf_redhat
Published
2010-10-08 02:08
Modified
2024-11-22 03:56
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
Updated kernel-rt packages that fix two security issues and three bugs are
now available for Red Hat Enterprise MRG 1.2.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The kernel-rt packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issues:
* The compat_alloc_user_space() function in the Linux kernel 32/64-bit
compatibility layer implementation was missing sanity checks. This function
could be abused in other areas of the Linux kernel if its length argument
can be controlled from user-space. On 64-bit systems, a local, unprivileged
user could use this flaw to escalate their privileges. (CVE-2010-3081,
Important)
* A missing upper bound integer check was found in the sys_io_submit()
function in the Linux kernel asynchronous I/O implementation. A local,
unprivileged user could use this flaw to cause an information leak.
(CVE-2010-3067, Low)
Red Hat would like to thank Ben Hawkes for reporting CVE-2010-3081, and
Tavis Ormandy for reporting CVE-2010-3067.
This update also fixes the following bugs:
* The RHSA-2010:0631 kernel-rt update resolved an issue (CVE-2010-2240)
where, when an application has a stack overflow, the stack could silently
overwrite another memory mapped area instead of a segmentation fault
occurring. This update implements the official upstream fixes for that
issue. Note: This is not a security regression. The original fix was
complete. (BZ#624604)
* In certain circumstances, under heavy load, certain network interface
cards using the bnx2 driver, and configured to use MSI-X, could stop
processing interrupts and then network connectivity would cease.
(BZ#622952)
* This update upgrades the tg3 driver to version 3.110. (BZ#640334)
Users are advised to upgrade to these updated packages, which contain
backported patches to correct these issues. The system must be rebooted for
this update to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel-rt packages that fix two security issues and three bugs are\nnow available for Red Hat Enterprise MRG 1.2.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* The compat_alloc_user_space() function in the Linux kernel 32/64-bit\ncompatibility layer implementation was missing sanity checks. This function\ncould be abused in other areas of the Linux kernel if its length argument\ncan be controlled from user-space. On 64-bit systems, a local, unprivileged\nuser could use this flaw to escalate their privileges. (CVE-2010-3081,\nImportant)\n\n* A missing upper bound integer check was found in the sys_io_submit()\nfunction in the Linux kernel asynchronous I/O implementation. A local,\nunprivileged user could use this flaw to cause an information leak.\n(CVE-2010-3067, Low)\n\nRed Hat would like to thank Ben Hawkes for reporting CVE-2010-3081, and\nTavis Ormandy for reporting CVE-2010-3067.\n\nThis update also fixes the following bugs:\n\n* The RHSA-2010:0631 kernel-rt update resolved an issue (CVE-2010-2240)\nwhere, when an application has a stack overflow, the stack could silently\noverwrite another memory mapped area instead of a segmentation fault\noccurring. This update implements the official upstream fixes for that\nissue. Note: This is not a security regression. The original fix was\ncomplete. (BZ#624604)\n\n* In certain circumstances, under heavy load, certain network interface\ncards using the bnx2 driver, and configured to use MSI-X, could stop\nprocessing interrupts and then network connectivity would cease.\n(BZ#622952)\n\n* This update upgrades the tg3 driver to version 3.110. (BZ#640334)\n\nUsers are advised to upgrade to these updated packages, which contain\nbackported patches to correct these issues. The system must be rebooted for\nthis update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0758", "url": "https://access.redhat.com/errata/RHSA-2010:0758" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/kb/docs/DOC-40265", "url": "https://access.redhat.com/kb/docs/DOC-40265" }, { "category": "external", "summary": "624604", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=624604" }, { "category": "external", "summary": "629441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=629441" }, { "category": "external", "summary": "634457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "category": "external", "summary": "640334", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=640334" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0758.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2024-11-22T03:56:39+00:00", "generator": { "date": "2024-11-22T03:56:39+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0758", "initial_release_date": "2010-10-08T02:08:00+00:00", "revision_history": [ { "date": "2010-10-08T02:08:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-10-07T22:12:02+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:56:39+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "MRG Realtime for RHEL 5 Server", "product": { "name": "MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:1::el5" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-5" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-trace-0:2.6.24.7-169.el5rt.i686", "product": { "name": "kernel-rt-trace-0:2.6.24.7-169.el5rt.i686", "product_id": "kernel-rt-trace-0:2.6.24.7-169.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-169.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686", "product": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686", "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-169.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686", "product": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686", "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-169.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686", "product": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686", "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-169.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686", "product": { "name": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686", "product_id": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-169.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686", "product": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686", "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-169.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686", "product": { "name": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686", "product_id": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-169.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:2.6.24.7-169.el5rt.i686", "product": { "name": "kernel-rt-debug-0:2.6.24.7-169.el5rt.i686", "product_id": "kernel-rt-debug-0:2.6.24.7-169.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-169.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686", "product": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686", "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-169.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-169.el5rt.i686", "product": { "name": "kernel-rt-0:2.6.24.7-169.el5rt.i686", "product_id": "kernel-rt-0:2.6.24.7-169.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-169.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686", "product": { "name": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686", "product_id": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-169.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:2.6.24.7-169.el5rt.i686", "product": { "name": "kernel-rt-devel-0:2.6.24.7-169.el5rt.i686", "product_id": "kernel-rt-devel-0:2.6.24.7-169.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-169.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686", "product": { "name": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686", "product_id": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-169.el5rt?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64", "product": { "name": "kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64", "product_id": "kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.24.7-169.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.24.7-169.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.24.7-169.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.24.7-169.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "product": { "name": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "product_id": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.24.7-169.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64", "product_id": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.24.7-169.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64", "product": { "name": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64", "product_id": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.24.7-169.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64", "product": { "name": "kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64", "product_id": "kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.24.7-169.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64", "product_id": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.24.7-169.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-169.el5rt.x86_64", "product": { "name": "kernel-rt-0:2.6.24.7-169.el5rt.x86_64", "product_id": "kernel-rt-0:2.6.24.7-169.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-169.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64", "product": { "name": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64", "product_id": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.24.7-169.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64", "product": { "name": "kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64", "product_id": "kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.24.7-169.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64", "product_id": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.24.7-169.el5rt?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch", "product": { "name": "kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch", "product_id": "kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.24.7-169.el5rt?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:2.6.24.7-169.el5rt.src", "product": { "name": "kernel-rt-0:2.6.24.7-169.el5rt.src", "product_id": "kernel-rt-0:2.6.24.7-169.el5rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.24.7-169.el5rt?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.i686" }, "product_reference": "kernel-rt-0:2.6.24.7-169.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-169.el5rt.src as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.src" }, "product_reference": "kernel-rt-0:2.6.24.7-169.el5rt.src", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.x86_64" }, "product_reference": "kernel-rt-0:2.6.24.7-169.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.i686" }, "product_reference": "kernel-rt-debug-0:2.6.24.7-169.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686" }, "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686" }, "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686" }, "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686" }, "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.i686" }, "product_reference": "kernel-rt-devel-0:2.6.24.7-169.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64" }, "product_reference": "kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch" }, "product_reference": "kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.i686" }, "product_reference": "kernel-rt-trace-0:2.6.24.7-169.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686" }, "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686" }, "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Tavis Ormandy" ] } ], "cve": "CVE-2010-3067", "discovery_date": "2010-09-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "629441" } ], "notes": [ { "category": "description", "text": "Integer overflow in the do_io_submit function in fs/aio.c in the Linux kernel before 2.6.36-rc4-next-20100915 allows local users to cause a denial of service or possibly have unspecified other impact via crafted use of the io_submit system call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: do_io_submit() infoleak", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3067" }, { "category": "external", "summary": "RHBZ#629441", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=629441" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3067", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3067" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3067", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3067" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-08T02:08:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0758" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: do_io_submit() infoleak" }, { "acknowledgments": [ { "names": [ "Ben Hawkes" ] } ], "cve": "CVE-2010-3081", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "634457" } ], "notes": [ { "category": "description", "text": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow", "title": "Vulnerability summary" }, { "category": "other", "text": "More information can be found in this kbase: https://access.redhat.com/kb/docs/DOC-40265.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3081" }, { "category": "external", "summary": "RHBZ#634457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3081", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-10-08T02:08:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0758" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.24.7-169.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.24.7-169.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.24.7-169.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow" } ] }
rhsa-2010_0718
Vulnerability from csaf_redhat
Published
2010-09-28 12:21
Modified
2024-11-22 03:46
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages that fix one security issue are now available for
Red Hat Enterprise Linux 4.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issue:
* The compat_alloc_user_space() function in the Linux kernel 32/64-bit
compatibility layer implementation was missing sanity checks. This function
could be abused in other areas of the Linux kernel if its length argument
can be controlled from user-space. On 64-bit systems, a local, unprivileged
user could use this flaw to escalate their privileges. (CVE-2010-3081,
Important)
Red Hat would like to thank Ben Hawkes for reporting this issue.
Refer to Knowledgebase article DOC-40265 for further details:
https://access.redhat.com/kb/docs/DOC-40265
Users should upgrade to these updated packages, which contain a backported
patch to correct this issue. The system must be rebooted for this update to
take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix one security issue are now available for\nRed Hat Enterprise Linux 4.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issue:\n\n* The compat_alloc_user_space() function in the Linux kernel 32/64-bit\ncompatibility layer implementation was missing sanity checks. This function\ncould be abused in other areas of the Linux kernel if its length argument\ncan be controlled from user-space. On 64-bit systems, a local, unprivileged\nuser could use this flaw to escalate their privileges. (CVE-2010-3081,\nImportant)\n\nRed Hat would like to thank Ben Hawkes for reporting this issue.\n\nRefer to Knowledgebase article DOC-40265 for further details:\nhttps://access.redhat.com/kb/docs/DOC-40265\n\nUsers should upgrade to these updated packages, which contain a backported\npatch to correct this issue. The system must be rebooted for this update to\ntake effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0718", "url": "https://access.redhat.com/errata/RHSA-2010:0718" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/kb/docs/DOC-40265", "url": "https://access.redhat.com/kb/docs/DOC-40265" }, { "category": "external", "summary": "634457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0718.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-22T03:46:52+00:00", "generator": { "date": "2024-11-22T03:46:52+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0718", "initial_release_date": "2010-09-28T12:21:00+00:00", "revision_history": [ { "date": "2010-09-28T12:21:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-09-28T08:26:12+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:46:52+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.9-89.29.1.EL.noarch", "product": { "name": "kernel-doc-0:2.6.9-89.29.1.EL.noarch", "product_id": "kernel-doc-0:2.6.9-89.29.1.EL.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-89.29.1.EL?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-89.29.1.EL.i686", "product": { "name": "kernel-0:2.6.9-89.29.1.EL.i686", "product_id": "kernel-0:2.6.9-89.29.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.29.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.29.1.EL.i686", "product": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.i686", "product_id": "kernel-devel-0:2.6.9-89.29.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.29.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-89.29.1.EL.i686", "product": { "name": "kernel-smp-devel-0:2.6.9-89.29.1.EL.i686", "product_id": "kernel-smp-devel-0:2.6.9-89.29.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.29.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.i686", "product": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.i686", "product_id": "kernel-debuginfo-0:2.6.9-89.29.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.29.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686", "product": { "name": "kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686", "product_id": "kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-89.29.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.6.9-89.29.1.EL.i686", "product": { "name": "kernel-hugemem-0:2.6.9-89.29.1.EL.i686", "product_id": "kernel-hugemem-0:2.6.9-89.29.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-89.29.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686", "product": { "name": "kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686", "product_id": "kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.29.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-89.29.1.EL.i686", "product": { "name": "kernel-smp-0:2.6.9-89.29.1.EL.i686", "product_id": "kernel-smp-0:2.6.9-89.29.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.29.1.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-89.29.1.EL.i686", "product": { "name": "kernel-xenU-0:2.6.9-89.29.1.EL.i686", "product_id": "kernel-xenU-0:2.6.9-89.29.1.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.29.1.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-89.29.1.EL.ia64", "product": { "name": "kernel-0:2.6.9-89.29.1.EL.ia64", "product_id": "kernel-0:2.6.9-89.29.1.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.29.1.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.29.1.EL.ia64", "product": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.ia64", "product_id": "kernel-devel-0:2.6.9-89.29.1.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.29.1.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.29.1.EL.ia64", "product": { "name": "kernel-largesmp-0:2.6.9-89.29.1.EL.ia64", "product_id": "kernel-largesmp-0:2.6.9-89.29.1.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.29.1.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64", "product_id": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.29.1.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.29.1.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-89.29.1.EL.src", "product": { "name": "kernel-0:2.6.9-89.29.1.EL.src", "product_id": "kernel-0:2.6.9-89.29.1.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.29.1.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-89.29.1.EL.x86_64", "product": { "name": "kernel-0:2.6.9-89.29.1.EL.x86_64", "product_id": "kernel-0:2.6.9-89.29.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.29.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.29.1.EL.x86_64", "product": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.x86_64", "product_id": "kernel-devel-0:2.6.9-89.29.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.29.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64", "product": { "name": "kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64", "product_id": "kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-89.29.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64", "product": { "name": "kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64", "product_id": "kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.29.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64", "product_id": "kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.29.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.29.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64", "product": { "name": "kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64", "product_id": "kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-89.29.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-89.29.1.EL.x86_64", "product": { "name": "kernel-smp-0:2.6.9-89.29.1.EL.x86_64", "product_id": "kernel-smp-0:2.6.9-89.29.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-89.29.1.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xenU-0:2.6.9-89.29.1.EL.x86_64", "product": { "name": "kernel-xenU-0:2.6.9-89.29.1.EL.x86_64", "product_id": "kernel-xenU-0:2.6.9-89.29.1.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-89.29.1.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-89.29.1.EL.ppc64", "product": { "name": "kernel-0:2.6.9-89.29.1.EL.ppc64", "product_id": "kernel-0:2.6.9-89.29.1.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.29.1.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.29.1.EL.ppc64", "product": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.ppc64", "product_id": "kernel-devel-0:2.6.9-89.29.1.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.29.1.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64", "product": { "name": "kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64", "product_id": "kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-89.29.1.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64", "product_id": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.29.1.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64", "product": { "name": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64", "product_id": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-89.29.1.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-89.29.1.EL.ppc64iseries", "product": { "name": "kernel-0:2.6.9-89.29.1.EL.ppc64iseries", "product_id": "kernel-0:2.6.9-89.29.1.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.29.1.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries", "product": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries", "product_id": "kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.29.1.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.29.1.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-89.29.1.EL.s390x", "product": { "name": "kernel-0:2.6.9-89.29.1.EL.s390x", "product_id": "kernel-0:2.6.9-89.29.1.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.29.1.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.29.1.EL.s390x", "product": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.s390x", "product_id": "kernel-devel-0:2.6.9-89.29.1.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.29.1.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x", "product_id": "kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.29.1.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-89.29.1.EL.s390", "product": { "name": "kernel-0:2.6.9-89.29.1.EL.s390", "product_id": "kernel-0:2.6.9-89.29.1.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-89.29.1.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.9-89.29.1.EL.s390", "product": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.s390", "product_id": "kernel-devel-0:2.6.9-89.29.1.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-89.29.1.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.s390", "product": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.s390", "product_id": "kernel-debuginfo-0:2.6.9-89.29.1.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-89.29.1.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.29.1.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.29.1.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.29.1.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.29.1.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.29.1.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.29.1.EL.src" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.29.1.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.29.1.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.29.1.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.29.1.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.29.1.EL.noarch as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-doc-0:2.6.9-89.29.1.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.29.1.EL.noarch", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.29.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.29.1.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.29.1.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.29.1.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.29.1.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.29.1.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.29.1.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.29.1.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.29.1.EL.src" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.29.1.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-doc-0:2.6.9-89.29.1.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.29.1.EL.noarch", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.29.1.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.29.1.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.29.1.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.29.1.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.29.1.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.29.1.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.29.1.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.29.1.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.29.1.EL.src" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.29.1.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.29.1.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.29.1.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.29.1.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.29.1.EL.noarch as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-doc-0:2.6.9-89.29.1.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.29.1.EL.noarch", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.29.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.29.1.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.29.1.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.29.1.EL.ia64" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.29.1.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.29.1.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.29.1.EL.s390" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.29.1.EL.s390x" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.29.1.EL.src" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.29.1.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.29.1.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.29.1.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.29.1.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-89.29.1.EL.noarch as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-doc-0:2.6.9-89.29.1.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-89.29.1.EL.noarch", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.29.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.29.1.EL.ia64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.29.1.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-xenU-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-xenU-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64" }, "product_reference": "kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ben Hawkes" ] } ], "cve": "CVE-2010-3081", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "634457" } ], "notes": [ { "category": "description", "text": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow", "title": "Vulnerability summary" }, { "category": "other", "text": "More information can be found in this kbase: https://access.redhat.com/kb/docs/DOC-40265.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-0:2.6.9-89.29.1.EL.ia64", "4AS:kernel-0:2.6.9-89.29.1.EL.ppc64", "4AS:kernel-0:2.6.9-89.29.1.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.29.1.EL.s390", "4AS:kernel-0:2.6.9-89.29.1.EL.s390x", "4AS:kernel-0:2.6.9-89.29.1.EL.src", "4AS:kernel-0:2.6.9-89.29.1.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-devel-0:2.6.9-89.29.1.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.29.1.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.29.1.EL.s390", "4AS:kernel-devel-0:2.6.9-89.29.1.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.29.1.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.29.1.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.29.1.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-smp-0:2.6.9-89.29.1.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.29.1.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-0:2.6.9-89.29.1.EL.ia64", "4Desktop:kernel-0:2.6.9-89.29.1.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.29.1.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.29.1.EL.s390", "4Desktop:kernel-0:2.6.9-89.29.1.EL.s390x", "4Desktop:kernel-0:2.6.9-89.29.1.EL.src", "4Desktop:kernel-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.29.1.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.29.1.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-0:2.6.9-89.29.1.EL.ia64", "4ES:kernel-0:2.6.9-89.29.1.EL.ppc64", "4ES:kernel-0:2.6.9-89.29.1.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.29.1.EL.s390", "4ES:kernel-0:2.6.9-89.29.1.EL.s390x", "4ES:kernel-0:2.6.9-89.29.1.EL.src", "4ES:kernel-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-devel-0:2.6.9-89.29.1.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.29.1.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.29.1.EL.s390", "4ES:kernel-devel-0:2.6.9-89.29.1.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.29.1.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.29.1.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-smp-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-0:2.6.9-89.29.1.EL.ia64", "4WS:kernel-0:2.6.9-89.29.1.EL.ppc64", "4WS:kernel-0:2.6.9-89.29.1.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.29.1.EL.s390", "4WS:kernel-0:2.6.9-89.29.1.EL.s390x", "4WS:kernel-0:2.6.9-89.29.1.EL.src", "4WS:kernel-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-devel-0:2.6.9-89.29.1.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.29.1.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.29.1.EL.s390", "4WS:kernel-devel-0:2.6.9-89.29.1.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.29.1.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.29.1.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-smp-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3081" }, { "category": "external", "summary": "RHBZ#634457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3081", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-09-28T12:21:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "4AS:kernel-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-0:2.6.9-89.29.1.EL.ia64", "4AS:kernel-0:2.6.9-89.29.1.EL.ppc64", "4AS:kernel-0:2.6.9-89.29.1.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.29.1.EL.s390", "4AS:kernel-0:2.6.9-89.29.1.EL.s390x", "4AS:kernel-0:2.6.9-89.29.1.EL.src", "4AS:kernel-0:2.6.9-89.29.1.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-devel-0:2.6.9-89.29.1.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.29.1.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.29.1.EL.s390", "4AS:kernel-devel-0:2.6.9-89.29.1.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.29.1.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.29.1.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.29.1.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-smp-0:2.6.9-89.29.1.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.29.1.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-0:2.6.9-89.29.1.EL.ia64", "4Desktop:kernel-0:2.6.9-89.29.1.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.29.1.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.29.1.EL.s390", "4Desktop:kernel-0:2.6.9-89.29.1.EL.s390x", "4Desktop:kernel-0:2.6.9-89.29.1.EL.src", "4Desktop:kernel-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.29.1.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.29.1.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-0:2.6.9-89.29.1.EL.ia64", "4ES:kernel-0:2.6.9-89.29.1.EL.ppc64", "4ES:kernel-0:2.6.9-89.29.1.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.29.1.EL.s390", "4ES:kernel-0:2.6.9-89.29.1.EL.s390x", "4ES:kernel-0:2.6.9-89.29.1.EL.src", "4ES:kernel-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-devel-0:2.6.9-89.29.1.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.29.1.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.29.1.EL.s390", "4ES:kernel-devel-0:2.6.9-89.29.1.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.29.1.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.29.1.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-smp-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-0:2.6.9-89.29.1.EL.ia64", "4WS:kernel-0:2.6.9-89.29.1.EL.ppc64", "4WS:kernel-0:2.6.9-89.29.1.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.29.1.EL.s390", "4WS:kernel-0:2.6.9-89.29.1.EL.s390x", "4WS:kernel-0:2.6.9-89.29.1.EL.src", "4WS:kernel-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-devel-0:2.6.9-89.29.1.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.29.1.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.29.1.EL.s390", "4WS:kernel-devel-0:2.6.9-89.29.1.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.29.1.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.29.1.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-smp-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2010:0718" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-0:2.6.9-89.29.1.EL.ia64", "4AS:kernel-0:2.6.9-89.29.1.EL.ppc64", "4AS:kernel-0:2.6.9-89.29.1.EL.ppc64iseries", "4AS:kernel-0:2.6.9-89.29.1.EL.s390", "4AS:kernel-0:2.6.9-89.29.1.EL.s390x", "4AS:kernel-0:2.6.9-89.29.1.EL.src", "4AS:kernel-0:2.6.9-89.29.1.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64", "4AS:kernel-devel-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-devel-0:2.6.9-89.29.1.EL.ia64", "4AS:kernel-devel-0:2.6.9-89.29.1.EL.ppc64", "4AS:kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-89.29.1.EL.s390", "4AS:kernel-devel-0:2.6.9-89.29.1.EL.s390x", "4AS:kernel-devel-0:2.6.9-89.29.1.EL.x86_64", "4AS:kernel-doc-0:2.6.9-89.29.1.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-largesmp-0:2.6.9-89.29.1.EL.ia64", "4AS:kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64", "4AS:kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64", "4AS:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64", "4AS:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64", "4AS:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64", "4AS:kernel-smp-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-smp-0:2.6.9-89.29.1.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64", "4AS:kernel-xenU-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-xenU-0:2.6.9-89.29.1.EL.x86_64", "4AS:kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686", "4AS:kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-0:2.6.9-89.29.1.EL.ia64", "4Desktop:kernel-0:2.6.9-89.29.1.EL.ppc64", "4Desktop:kernel-0:2.6.9-89.29.1.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-89.29.1.EL.s390", "4Desktop:kernel-0:2.6.9-89.29.1.EL.s390x", "4Desktop:kernel-0:2.6.9-89.29.1.EL.src", "4Desktop:kernel-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.s390", "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-89.29.1.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-largesmp-0:2.6.9-89.29.1.EL.ia64", "4Desktop:kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64", "4Desktop:kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64", "4Desktop:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-smp-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-smp-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-xenU-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-xenU-0:2.6.9-89.29.1.EL.x86_64", "4Desktop:kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686", "4Desktop:kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-0:2.6.9-89.29.1.EL.ia64", "4ES:kernel-0:2.6.9-89.29.1.EL.ppc64", "4ES:kernel-0:2.6.9-89.29.1.EL.ppc64iseries", "4ES:kernel-0:2.6.9-89.29.1.EL.s390", "4ES:kernel-0:2.6.9-89.29.1.EL.s390x", "4ES:kernel-0:2.6.9-89.29.1.EL.src", "4ES:kernel-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-devel-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-devel-0:2.6.9-89.29.1.EL.ia64", "4ES:kernel-devel-0:2.6.9-89.29.1.EL.ppc64", "4ES:kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-89.29.1.EL.s390", "4ES:kernel-devel-0:2.6.9-89.29.1.EL.s390x", "4ES:kernel-devel-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-doc-0:2.6.9-89.29.1.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-largesmp-0:2.6.9-89.29.1.EL.ia64", "4ES:kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64", "4ES:kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64", "4ES:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64", "4ES:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-smp-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-smp-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-xenU-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-xenU-0:2.6.9-89.29.1.EL.x86_64", "4ES:kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686", "4ES:kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-0:2.6.9-89.29.1.EL.ia64", "4WS:kernel-0:2.6.9-89.29.1.EL.ppc64", "4WS:kernel-0:2.6.9-89.29.1.EL.ppc64iseries", "4WS:kernel-0:2.6.9-89.29.1.EL.s390", "4WS:kernel-0:2.6.9-89.29.1.EL.s390x", "4WS:kernel-0:2.6.9-89.29.1.EL.src", "4WS:kernel-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-devel-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-devel-0:2.6.9-89.29.1.EL.ia64", "4WS:kernel-devel-0:2.6.9-89.29.1.EL.ppc64", "4WS:kernel-devel-0:2.6.9-89.29.1.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-89.29.1.EL.s390", "4WS:kernel-devel-0:2.6.9-89.29.1.EL.s390x", "4WS:kernel-devel-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-doc-0:2.6.9-89.29.1.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-largesmp-0:2.6.9-89.29.1.EL.ia64", "4WS:kernel-largesmp-0:2.6.9-89.29.1.EL.ppc64", "4WS:kernel-largesmp-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ia64", "4WS:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.ppc64", "4WS:kernel-largesmp-devel-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-smp-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-smp-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-xenU-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-xenU-0:2.6.9-89.29.1.EL.x86_64", "4WS:kernel-xenU-devel-0:2.6.9-89.29.1.EL.i686", "4WS:kernel-xenU-devel-0:2.6.9-89.29.1.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow" } ] }
rhsa-2010_0704
Vulnerability from csaf_redhat
Published
2010-09-21 08:03
Modified
2024-11-22 03:46
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issue:
* The compat_alloc_user_space() function in the Linux kernel 32/64-bit
compatibility layer implementation was missing sanity checks. This function
could be abused in other areas of the Linux kernel if its length argument
can be controlled from user-space. On 64-bit systems, a local, unprivileged
user could use this flaw to escalate their privileges. (CVE-2010-3081,
Important)
Red Hat would like to thank Ben Hawkes for reporting this issue.
Red Hat is aware that a public exploit for this issue is available. Refer
to Knowledgebase article DOC-40265 for further details:
https://access.redhat.com/kb/docs/DOC-40265
Users should upgrade to these updated packages, which contain a backported
patch to correct this issue. The system must be rebooted for this update to
take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix one security issue are now available for\nRed Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issue:\n\n* The compat_alloc_user_space() function in the Linux kernel 32/64-bit\ncompatibility layer implementation was missing sanity checks. This function\ncould be abused in other areas of the Linux kernel if its length argument\ncan be controlled from user-space. On 64-bit systems, a local, unprivileged\nuser could use this flaw to escalate their privileges. (CVE-2010-3081,\nImportant)\n\nRed Hat would like to thank Ben Hawkes for reporting this issue.\n\nRed Hat is aware that a public exploit for this issue is available. Refer\nto Knowledgebase article DOC-40265 for further details:\nhttps://access.redhat.com/kb/docs/DOC-40265\n\nUsers should upgrade to these updated packages, which contain a backported\npatch to correct this issue. The system must be rebooted for this update to\ntake effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0704", "url": "https://access.redhat.com/errata/RHSA-2010:0704" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/kb/docs/DOC-40265", "url": "https://access.redhat.com/kb/docs/DOC-40265" }, { "category": "external", "summary": "634457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0704.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-22T03:46:41+00:00", "generator": { "date": "2024-11-22T03:46:41+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0704", "initial_release_date": "2010-09-21T08:03:00+00:00", "revision_history": [ { "date": "2010-09-21T08:03:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-09-21T04:09:24+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:46:41+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-194.11.4.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-194.11.4.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-194.11.4.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-194.11.4.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-194.11.4.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-194.11.4.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-194.11.4.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.11.4.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-194.11.4.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-194.11.4.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-194.11.4.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-194.11.4.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.11.4.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.11.4.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-194.11.4.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-194.11.4.el5.i686", "product_id": "kernel-debug-0:2.6.18-194.11.4.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.11.4.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-194.11.4.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-194.11.4.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-194.11.4.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-194.11.4.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-194.11.4.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-194.11.4.el5.i686", "product_id": "kernel-PAE-0:2.6.18-194.11.4.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-194.11.4.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-194.11.4.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-194.11.4.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-194.11.4.el5.i686", "product_id": "kernel-devel-0:2.6.18-194.11.4.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.11.4.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-194.11.4.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-194.11.4.el5.i686", "product_id": "kernel-xen-0:2.6.18-194.11.4.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-194.11.4.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-194.11.4.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-194.11.4.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-194.11.4.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.11.4.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-194.11.4.el5.i686", "product": { "name": "kernel-0:2.6.18-194.11.4.el5.i686", "product_id": "kernel-0:2.6.18-194.11.4.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.11.4.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.11.4.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-194.11.4.el5.i386", "product_id": "kernel-headers-0:2.6.18-194.11.4.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.11.4.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.11.4.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-194.11.4.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-194.11.4.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-194.11.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-194.11.4.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.11.4.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.11.4.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-194.11.4.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-194.11.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.11.4.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.11.4.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-194.11.4.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-194.11.4.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-194.11.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.11.4.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-194.11.4.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-194.11.4.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-194.11.4.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-194.11.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.11.4.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-194.11.4.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-194.11.4.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-194.11.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-194.11.4.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-194.11.4.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-194.11.4.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-194.11.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.11.4.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-194.11.4.el5.x86_64", "product": { "name": "kernel-0:2.6.18-194.11.4.el5.x86_64", "product_id": "kernel-0:2.6.18-194.11.4.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.11.4.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-194.11.4.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-194.11.4.el5.noarch", "product_id": "kernel-doc-0:2.6.18-194.11.4.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-194.11.4.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-194.11.4.el5.src", "product": { "name": "kernel-0:2.6.18-194.11.4.el5.src", "product_id": "kernel-0:2.6.18-194.11.4.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.11.4.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-194.11.4.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-194.11.4.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-194.11.4.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.11.4.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-194.11.4.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-194.11.4.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-194.11.4.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-194.11.4.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.11.4.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.11.4.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-194.11.4.el5.ia64", "product_id": "kernel-headers-0:2.6.18-194.11.4.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.11.4.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.11.4.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-194.11.4.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-194.11.4.el5.ia64", "product_id": "kernel-debug-0:2.6.18-194.11.4.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.11.4.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-194.11.4.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-194.11.4.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-194.11.4.el5.ia64", "product_id": "kernel-devel-0:2.6.18-194.11.4.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.11.4.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-194.11.4.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-194.11.4.el5.ia64", "product_id": "kernel-xen-0:2.6.18-194.11.4.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-194.11.4.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-194.11.4.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-194.11.4.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-194.11.4.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.11.4.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-194.11.4.el5.ia64", "product": { "name": "kernel-0:2.6.18-194.11.4.el5.ia64", "product_id": "kernel-0:2.6.18-194.11.4.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.11.4.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.11.4.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.11.4.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.11.4.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-194.11.4.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-194.11.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.11.4.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-194.11.4.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-194.11.4.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-194.11.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-194.11.4.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.11.4.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-194.11.4.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-194.11.4.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-194.11.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.11.4.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-194.11.4.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-194.11.4.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-194.11.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.11.4.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-194.11.4.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-194.11.4.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-194.11.4.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-194.11.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.11.4.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-194.11.4.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-194.11.4.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-194.11.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-194.11.4.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-194.11.4.el5.ppc64", "product": { "name": "kernel-0:2.6.18-194.11.4.el5.ppc64", "product_id": "kernel-0:2.6.18-194.11.4.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.11.4.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.11.4.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-194.11.4.el5.ppc", "product_id": "kernel-headers-0:2.6.18-194.11.4.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.11.4.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-194.11.4.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-194.11.4.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-194.11.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-194.11.4.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-194.11.4.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-194.11.4.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-194.11.4.el5.s390x", "product_id": "kernel-headers-0:2.6.18-194.11.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-194.11.4.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-194.11.4.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-194.11.4.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-194.11.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-194.11.4.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-194.11.4.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-194.11.4.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-194.11.4.el5.s390x", "product_id": "kernel-debug-0:2.6.18-194.11.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-194.11.4.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-194.11.4.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-194.11.4.el5.s390x", "product_id": "kernel-devel-0:2.6.18-194.11.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-194.11.4.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-194.11.4.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-194.11.4.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-194.11.4.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-194.11.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-194.11.4.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-194.11.4.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-194.11.4.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-194.11.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-194.11.4.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-194.11.4.el5.s390x", "product": { "name": "kernel-0:2.6.18-194.11.4.el5.s390x", "product_id": "kernel-0:2.6.18-194.11.4.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-194.11.4.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.11.4.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.11.4.el5.ia64" }, "product_reference": "kernel-0:2.6.18-194.11.4.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.11.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.11.4.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-194.11.4.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.11.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.11.4.el5.s390x" }, "product_reference": "kernel-0:2.6.18-194.11.4.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.11.4.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.11.4.el5.src" }, "product_reference": "kernel-0:2.6.18-194.11.4.el5.src", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.11.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-0:2.6.18-194.11.4.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-194.11.4.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-PAE-devel-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.11.4.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-194.11.4.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-194.11.4.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.11.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-194.11.4.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-194.11.4.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.11.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-194.11.4.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-194.11.4.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.11.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-0:2.6.18-194.11.4.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-194.11.4.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.11.4.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-194.11.4.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.11.4.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.11.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-194.11.4.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.11.4.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.11.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-194.11.4.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.11.4.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.11.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debug-devel-0:2.6.18-194.11.4.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.11.4.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.11.4.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-194.11.4.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.11.4.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.11.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-194.11.4.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.11.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-194.11.4.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.11.4.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.11.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-0:2.6.18-194.11.4.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.11.4.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-194.11.4.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-194.11.4.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.11.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-194.11.4.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-194.11.4.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.11.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-194.11.4.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-194.11.4.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.11.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-devel-0:2.6.18-194.11.4.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-194.11.4.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-194.11.4.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-doc-0:2.6.18-194.11.4.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-194.11.4.el5.noarch", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.11.4.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.11.4.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-194.11.4.el5.i386", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.11.4.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.11.4.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-194.11.4.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.11.4.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.11.4.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-194.11.4.el5.ppc", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.11.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.11.4.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-194.11.4.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.11.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.11.4.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-194.11.4.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.11.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-headers-0:2.6.18-194.11.4.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-194.11.4.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-194.11.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-194.11.4.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-194.11.4.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-194.11.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-0:2.6.18-194.11.4.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-194.11.4.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-194.11.4.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-194.11.4.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-194.11.4.el5.ppc64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-194.11.4.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-kdump-devel-0:2.6.18-194.11.4.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-194.11.4.el5.s390x", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.11.4.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-194.11.4.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-194.11.4.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.11.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-0:2.6.18-194.11.4.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-194.11.4.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.11.4.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-194.11.4.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.11.4.el5.ia64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.11.4.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client:kernel-xen-devel-0:2.6.18-194.11.4.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.11.4.el5.x86_64", "relates_to_product_reference": "5Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.11.4.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.11.4.el5.ia64" }, "product_reference": "kernel-0:2.6.18-194.11.4.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.11.4.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.11.4.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-194.11.4.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.11.4.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.11.4.el5.s390x" }, "product_reference": "kernel-0:2.6.18-194.11.4.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.11.4.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.11.4.el5.src" }, "product_reference": "kernel-0:2.6.18-194.11.4.el5.src", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-194.11.4.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-0:2.6.18-194.11.4.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-194.11.4.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-PAE-devel-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.11.4.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-194.11.4.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-194.11.4.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.11.4.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-194.11.4.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-194.11.4.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.11.4.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-194.11.4.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-194.11.4.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-194.11.4.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-0:2.6.18-194.11.4.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-194.11.4.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.11.4.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-194.11.4.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.11.4.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.11.4.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-194.11.4.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.11.4.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.11.4.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-194.11.4.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.11.4.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-194.11.4.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debug-devel-0:2.6.18-194.11.4.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-194.11.4.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.11.4.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-194.11.4.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.11.4.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.11.4.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-194.11.4.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.11.4.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-194.11.4.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.11.4.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-194.11.4.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-0:2.6.18-194.11.4.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-194.11.4.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.11.4.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-194.11.4.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-194.11.4.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.11.4.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-194.11.4.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-194.11.4.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.11.4.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-194.11.4.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-194.11.4.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-194.11.4.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-devel-0:2.6.18-194.11.4.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-194.11.4.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-194.11.4.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-doc-0:2.6.18-194.11.4.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-194.11.4.el5.noarch", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.11.4.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.11.4.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-194.11.4.el5.i386", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.11.4.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.11.4.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-194.11.4.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.11.4.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.11.4.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-194.11.4.el5.ppc", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.11.4.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.11.4.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-194.11.4.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.11.4.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.11.4.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-194.11.4.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-194.11.4.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-headers-0:2.6.18-194.11.4.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-194.11.4.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-194.11.4.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-194.11.4.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-194.11.4.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-194.11.4.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-0:2.6.18-194.11.4.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-194.11.4.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-194.11.4.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-194.11.4.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-194.11.4.el5.ppc64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-194.11.4.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-kdump-devel-0:2.6.18-194.11.4.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-194.11.4.el5.s390x", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.11.4.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-194.11.4.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-194.11.4.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-194.11.4.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-0:2.6.18-194.11.4.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-194.11.4.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.11.4.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-194.11.4.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.11.4.el5.i686", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.11.4.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-194.11.4.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.11.4.el5.ia64", "relates_to_product_reference": "5Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-194.11.4.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server:kernel-xen-devel-0:2.6.18-194.11.4.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-194.11.4.el5.x86_64", "relates_to_product_reference": "5Server" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ben Hawkes" ] } ], "cve": "CVE-2010-3081", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "634457" } ], "notes": [ { "category": "description", "text": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow", "title": "Vulnerability summary" }, { "category": "other", "text": "More information can be found in this kbase: https://access.redhat.com/kb/docs/DOC-40265.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client:kernel-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-0:2.6.18-194.11.4.el5.src", "5Client:kernel-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-debug-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-debug-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-devel-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.11.4.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.11.4.el5.i386", "5Client:kernel-headers-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.11.4.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-xen-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-0:2.6.18-194.11.4.el5.src", "5Server:kernel-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-debug-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-debug-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-devel-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.11.4.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.11.4.el5.i386", "5Server:kernel-headers-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.11.4.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-xen-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.11.4.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3081" }, { "category": "external", "summary": "RHBZ#634457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3081", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-09-21T08:03:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client:kernel-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-0:2.6.18-194.11.4.el5.src", "5Client:kernel-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-debug-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-debug-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-devel-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.11.4.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.11.4.el5.i386", "5Client:kernel-headers-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.11.4.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-xen-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-0:2.6.18-194.11.4.el5.src", "5Server:kernel-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-debug-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-debug-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-devel-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.11.4.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.11.4.el5.i386", "5Server:kernel-headers-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.11.4.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-xen-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.11.4.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0704" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client:kernel-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-0:2.6.18-194.11.4.el5.src", "5Client:kernel-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-PAE-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-PAE-debuginfo-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-PAE-devel-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-debug-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-debug-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-debug-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-debug-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-debug-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-debug-devel-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-debug-devel-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-debug-devel-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-debug-devel-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-debug-devel-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-debuginfo-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-debuginfo-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-debuginfo-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-devel-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-devel-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-devel-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-devel-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-devel-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-doc-0:2.6.18-194.11.4.el5.noarch", "5Client:kernel-headers-0:2.6.18-194.11.4.el5.i386", "5Client:kernel-headers-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-headers-0:2.6.18-194.11.4.el5.ppc", "5Client:kernel-headers-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-headers-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-headers-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-kdump-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-kdump-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-kdump-devel-0:2.6.18-194.11.4.el5.ppc64", "5Client:kernel-kdump-devel-0:2.6.18-194.11.4.el5.s390x", "5Client:kernel-xen-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-xen-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-xen-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "5Client:kernel-xen-devel-0:2.6.18-194.11.4.el5.i686", "5Client:kernel-xen-devel-0:2.6.18-194.11.4.el5.ia64", "5Client:kernel-xen-devel-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-0:2.6.18-194.11.4.el5.src", "5Server:kernel-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-PAE-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-PAE-debuginfo-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-PAE-devel-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-debug-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-debug-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-debug-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-debug-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-debug-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-debug-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-debug-devel-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-debug-devel-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-debug-devel-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-debug-devel-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-debug-devel-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-debuginfo-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-debuginfo-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-debuginfo-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-debuginfo-common-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-devel-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-devel-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-devel-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-devel-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-devel-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-doc-0:2.6.18-194.11.4.el5.noarch", "5Server:kernel-headers-0:2.6.18-194.11.4.el5.i386", "5Server:kernel-headers-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-headers-0:2.6.18-194.11.4.el5.ppc", "5Server:kernel-headers-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-headers-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-headers-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-kdump-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-kdump-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-kdump-debuginfo-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-kdump-devel-0:2.6.18-194.11.4.el5.ppc64", "5Server:kernel-kdump-devel-0:2.6.18-194.11.4.el5.s390x", "5Server:kernel-xen-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-xen-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-xen-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-xen-debuginfo-0:2.6.18-194.11.4.el5.x86_64", "5Server:kernel-xen-devel-0:2.6.18-194.11.4.el5.i686", "5Server:kernel-xen-devel-0:2.6.18-194.11.4.el5.ia64", "5Server:kernel-xen-devel-0:2.6.18-194.11.4.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow" } ] }
rhsa-2010_0711
Vulnerability from csaf_redhat
Published
2010-09-22 14:19
Modified
2024-11-22 03:46
Summary
Red Hat Security Advisory: kernel security update
Notes
Topic
Updated kernel packages that fix one security issue are now available for
Red Hat Enterprise Linux 5.3 Extended Update Support.
The Red Hat Security Response Team has rated this update as having
important security impact. A Common Vulnerability Scoring System (CVSS)
base score, which gives a detailed severity rating, is available from the
CVE link in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
This update fixes the following security issue:
* The compat_alloc_user_space() function in the Linux kernel 32/64-bit
compatibility layer implementation was missing sanity checks. This function
could be abused in other areas of the Linux kernel if its length argument
can be controlled from user-space. On 64-bit systems, a local, unprivileged
user could use this flaw to escalate their privileges. (CVE-2010-3081,
Important)
Red Hat would like to thank Ben Hawkes for reporting this issue.
Red Hat is aware that a public exploit for this issue is available. Refer
to Knowledgebase article DOC-40265 for further details:
https://access.redhat.com/kb/docs/DOC-40265
Users should upgrade to these updated packages, which contain a backported
patch to correct this issue. The system must be rebooted for this update to
take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix one security issue are now available for\nRed Hat Enterprise Linux 5.3 Extended Update Support.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. A Common Vulnerability Scoring System (CVSS)\nbase score, which gives a detailed severity rating, is available from the\nCVE link in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issue:\n\n* The compat_alloc_user_space() function in the Linux kernel 32/64-bit\ncompatibility layer implementation was missing sanity checks. This function\ncould be abused in other areas of the Linux kernel if its length argument\ncan be controlled from user-space. On 64-bit systems, a local, unprivileged\nuser could use this flaw to escalate their privileges. (CVE-2010-3081,\nImportant)\n\nRed Hat would like to thank Ben Hawkes for reporting this issue.\n\nRed Hat is aware that a public exploit for this issue is available. Refer\nto Knowledgebase article DOC-40265 for further details:\nhttps://access.redhat.com/kb/docs/DOC-40265\n\nUsers should upgrade to these updated packages, which contain a backported\npatch to correct this issue. The system must be rebooted for this update to\ntake effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2010:0711", "url": "https://access.redhat.com/errata/RHSA-2010:0711" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://access.redhat.com/kb/docs/DOC-40265", "url": "https://access.redhat.com/kb/docs/DOC-40265" }, { "category": "external", "summary": "634457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2010/rhsa-2010_0711.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-22T03:46:48+00:00", "generator": { "date": "2024-11-22T03:46:48+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2010:0711", "initial_release_date": "2010-09-22T14:19:00+00:00", "revision_history": [ { "date": "2010-09-22T14:19:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2010-09-22T10:19:56+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T03:46:48+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux EUS (v. 5.3 server)", "product": { "name": "Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:5.3" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.23.2.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-128.23.2.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-128.23.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.23.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-128.23.2.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-128.23.2.el5.i686", "product_id": "kernel-xen-0:2.6.18-128.23.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.23.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.23.2.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.23.2.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-128.23.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.23.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.23.2.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-128.23.2.el5.i686", "product_id": "kernel-devel-0:2.6.18-128.23.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.23.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.23.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-128.23.2.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-128.23.2.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-128.23.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-128.23.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.23.2.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-128.23.2.el5.i686", "product_id": "kernel-debug-0:2.6.18-128.23.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.23.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-128.23.2.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-128.23.2.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-128.23.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.23.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-128.23.2.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-128.23.2.el5.i686", "product_id": "kernel-PAE-0:2.6.18-128.23.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-128.23.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.23.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.23.2.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-128.23.2.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-128.23.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.23.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.23.2.el5.i686", "product": { "name": "kernel-0:2.6.18-128.23.2.el5.i686", "product_id": "kernel-0:2.6.18-128.23.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.23.2.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-128.23.2.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-128.23.2.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-128.23.2.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-128.23.2.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.23.2.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-128.23.2.el5.i386", "product_id": "kernel-headers-0:2.6.18-128.23.2.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.23.2.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.23.2.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-128.23.2.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-128.23.2.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.23.2.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-128.23.2.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-128.23.2.el5.ia64", "product_id": "kernel-xen-0:2.6.18-128.23.2.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.23.2.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.23.2.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.23.2.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-128.23.2.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.23.2.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.23.2.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-128.23.2.el5.ia64", "product_id": "kernel-headers-0:2.6.18-128.23.2.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.23.2.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.23.2.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-128.23.2.el5.ia64", "product_id": "kernel-devel-0:2.6.18-128.23.2.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.23.2.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.23.2.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.23.2.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-128.23.2.el5.ia64", "product_id": "kernel-debug-0:2.6.18-128.23.2.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.23.2.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-128.23.2.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-128.23.2.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-128.23.2.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.23.2.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.23.2.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.23.2.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-128.23.2.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-128.23.2.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.23.2.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.23.2.el5.ia64", "product": { "name": "kernel-0:2.6.18-128.23.2.el5.ia64", "product_id": "kernel-0:2.6.18-128.23.2.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.23.2.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.23.2.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-128.23.2.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-128.23.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.23.2.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.23.2.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.23.2.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-128.23.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.23.2.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.23.2.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-128.23.2.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-128.23.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.23.2.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.23.2.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-128.23.2.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-128.23.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.23.2.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.23.2.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.23.2.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-128.23.2.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-128.23.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.23.2.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.23.2.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-128.23.2.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-128.23.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.23.2.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-128.23.2.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.23.2.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.23.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.23.2.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.23.2.el5.ppc64", "product": { "name": "kernel-0:2.6.18-128.23.2.el5.ppc64", "product_id": "kernel-0:2.6.18-128.23.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.23.2.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-128.23.2.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-128.23.2.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-128.23.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.23.2.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-128.23.2.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-128.23.2.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-128.23.2.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.23.2.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.23.2.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-128.23.2.el5.ppc", "product_id": "kernel-headers-0:2.6.18-128.23.2.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.23.2.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.23.2.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-128.23.2.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-128.23.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.23.2.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.23.2.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.23.2.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-128.23.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.23.2.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.23.2.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-128.23.2.el5.s390x", "product_id": "kernel-headers-0:2.6.18-128.23.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.23.2.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.23.2.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-128.23.2.el5.s390x", "product_id": "kernel-devel-0:2.6.18-128.23.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.23.2.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.23.2.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.23.2.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-128.23.2.el5.s390x", "product_id": "kernel-debug-0:2.6.18-128.23.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.23.2.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.23.2.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-128.23.2.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-128.23.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.23.2.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-128.23.2.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.23.2.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-128.23.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-128.23.2.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.23.2.el5.s390x", "product": { "name": "kernel-0:2.6.18-128.23.2.el5.s390x", "product_id": "kernel-0:2.6.18-128.23.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.23.2.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-128.23.2.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-128.23.2.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-128.23.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-128.23.2.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-128.23.2.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-128.23.2.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-128.23.2.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-128.23.2.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-128.23.2.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-128.23.2.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-128.23.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-128.23.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-128.23.2.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-128.23.2.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-128.23.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-128.23.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-128.23.2.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-128.23.2.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-128.23.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-128.23.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-128.23.2.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-128.23.2.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-128.23.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-128.23.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-128.23.2.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-128.23.2.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-128.23.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-128.23.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-128.23.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-128.23.2.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-128.23.2.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-128.23.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-128.23.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-128.23.2.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-128.23.2.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-128.23.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-128.23.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-128.23.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-128.23.2.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-128.23.2.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-128.23.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-128.23.2.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-128.23.2.el5.x86_64", "product": { "name": "kernel-0:2.6.18-128.23.2.el5.x86_64", "product_id": "kernel-0:2.6.18-128.23.2.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.23.2.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-128.23.2.el5.src", "product": { "name": "kernel-0:2.6.18-128.23.2.el5.src", "product_id": "kernel-0:2.6.18-128.23.2.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-128.23.2.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-128.23.2.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-128.23.2.el5.noarch", "product_id": "kernel-doc-0:2.6.18-128.23.2.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-128.23.2.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.23.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.23.2.el5.i686" }, "product_reference": "kernel-0:2.6.18-128.23.2.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.23.2.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.23.2.el5.ia64" }, "product_reference": "kernel-0:2.6.18-128.23.2.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.23.2.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.23.2.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-128.23.2.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.23.2.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.23.2.el5.s390x" }, "product_reference": "kernel-0:2.6.18-128.23.2.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.23.2.el5.src as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.23.2.el5.src" }, "product_reference": "kernel-0:2.6.18-128.23.2.el5.src", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-128.23.2.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-0:2.6.18-128.23.2.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-128.23.2.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-128.23.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.23.2.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-128.23.2.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-128.23.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.23.2.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-128.23.2.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-128.23.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.23.2.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-128.23.2.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.23.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.23.2.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-128.23.2.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.23.2.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.23.2.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-128.23.2.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.23.2.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.23.2.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-128.23.2.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.23.2.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.23.2.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-128.23.2.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-128.23.2.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-0:2.6.18-128.23.2.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-128.23.2.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.23.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.23.2.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.23.2.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.23.2.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.23.2.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.23.2.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.23.2.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.23.2.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.23.2.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.23.2.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.23.2.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.23.2.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-128.23.2.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.23.2.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-128.23.2.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.23.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.23.2.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.23.2.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.23.2.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.23.2.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.23.2.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.23.2.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.23.2.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.23.2.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.23.2.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.23.2.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.23.2.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-128.23.2.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.23.2.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-128.23.2.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.23.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.23.2.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.23.2.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.23.2.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.23.2.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.23.2.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.23.2.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.23.2.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.23.2.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.23.2.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.23.2.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.23.2.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-128.23.2.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.23.2.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-128.23.2.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.23.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.23.2.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-128.23.2.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.23.2.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.23.2.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-128.23.2.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.23.2.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.23.2.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-128.23.2.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.23.2.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.23.2.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-128.23.2.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-128.23.2.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-devel-0:2.6.18-128.23.2.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-128.23.2.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-128.23.2.el5.noarch as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-doc-0:2.6.18-128.23.2.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-128.23.2.el5.noarch", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.23.2.el5.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.23.2.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-128.23.2.el5.i386", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.23.2.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.23.2.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-128.23.2.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.23.2.el5.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.23.2.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-128.23.2.el5.ppc", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.23.2.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.23.2.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-128.23.2.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.23.2.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.23.2.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-128.23.2.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-128.23.2.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-headers-0:2.6.18-128.23.2.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-128.23.2.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.23.2.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.23.2.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-128.23.2.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-128.23.2.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.23.2.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-128.23.2.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.23.2.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.23.2.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.23.2.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-128.23.2.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.23.2.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-128.23.2.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.23.2.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.23.2.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.23.2.el5.ppc64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-128.23.2.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.23.2.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-128.23.2.el5.s390x", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.23.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.23.2.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-128.23.2.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.23.2.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.23.2.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-128.23.2.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-128.23.2.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-0:2.6.18-128.23.2.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-128.23.2.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.23.2.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.23.2.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.23.2.el5.i686", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.23.2.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.23.2.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.23.2.el5.ia64", "relates_to_product_reference": "5Server-5.3.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-128.23.2.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.3 server)", "product_id": "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.23.2.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-128.23.2.el5.x86_64", "relates_to_product_reference": "5Server-5.3.Z" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Ben Hawkes" ] } ], "cve": "CVE-2010-3081", "cwe": { "id": "CWE-119", "name": "Improper Restriction of Operations within the Bounds of a Memory Buffer" }, "discovery_date": "2010-09-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "634457" } ], "notes": [ { "category": "description", "text": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow", "title": "Vulnerability summary" }, { "category": "other", "text": "More information can be found in this kbase: https://access.redhat.com/kb/docs/DOC-40265.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.3.Z:kernel-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-0:2.6.18-128.23.2.el5.src", "5Server-5.3.Z:kernel-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-doc-0:2.6.18-128.23.2.el5.noarch", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.23.2.el5.i386", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.23.2.el5.ppc", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.23.2.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3081" }, { "category": "external", "summary": "RHBZ#634457", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3081", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3081" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081" } ], "release_date": "2010-09-15T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2010-09-22T14:19:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-5.3.Z:kernel-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-0:2.6.18-128.23.2.el5.src", "5Server-5.3.Z:kernel-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-doc-0:2.6.18-128.23.2.el5.noarch", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.23.2.el5.i386", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.23.2.el5.ppc", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.23.2.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2010:0711" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-5.3.Z:kernel-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-0:2.6.18-128.23.2.el5.src", "5Server-5.3.Z:kernel-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-PAE-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-PAE-debuginfo-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-PAE-devel-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-debug-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-debug-debuginfo-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-debug-devel-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-debuginfo-common-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-devel-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-doc-0:2.6.18-128.23.2.el5.noarch", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.23.2.el5.i386", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.23.2.el5.ppc", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-headers-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-kdump-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-kdump-debuginfo-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.23.2.el5.ppc64", "5Server-5.3.Z:kernel-kdump-devel-0:2.6.18-128.23.2.el5.s390x", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-xen-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-xen-debuginfo-0:2.6.18-128.23.2.el5.x86_64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.23.2.el5.i686", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.23.2.el5.ia64", "5Server-5.3.Z:kernel-xen-devel-0:2.6.18-128.23.2.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: 64-bit Compatibility Mode Stack Pointer Underflow" } ] }
gsd-2010-3081
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2010-3081", "description": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010.", "id": "GSD-2010-3081", "references": [ "https://www.suse.com/security/cve/CVE-2010-3081.html", "https://www.debian.org/security/2010/dsa-2110", "https://access.redhat.com/errata/RHSA-2010:0882", "https://access.redhat.com/errata/RHSA-2010:0842", "https://access.redhat.com/errata/RHSA-2010:0758", "https://access.redhat.com/errata/RHSA-2010:0719", "https://access.redhat.com/errata/RHSA-2010:0718", "https://access.redhat.com/errata/RHSA-2010:0711", "https://access.redhat.com/errata/RHSA-2010:0705", "https://access.redhat.com/errata/RHSA-2010:0704", "https://linux.oracle.com/cve/CVE-2010-3081.html", "https://packetstormsecurity.com/files/cve/CVE-2010-3081" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2010-3081" ], "details": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010.", "id": "GSD-2010-3081", "modified": "2023-12-13T01:21:33.886109Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-3081", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.redhat.com/support/errata/RHSA-2010-0882.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2010-0882.html" }, { "name": "http://secunia.com/advisories/43315", "refsource": "MISC", "url": "http://secunia.com/advisories/43315" }, { "name": "http://www.securityfocus.com/archive/1/516397/100/0/threaded", "refsource": "MISC", "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html", "refsource": "MISC", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { "name": "http://www.vupen.com/english/advisories/2011/0298", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2011/0298" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html" }, { "name": "http://www.redhat.com/support/errata/RHSA-2010-0842.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2010-0842.html" }, { "name": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html", "refsource": "MISC", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html" }, { "name": "http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0273.html", "refsource": "MISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0273.html" }, { "name": "http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0278.html", "refsource": "MISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0278.html" }, { "name": "http://blog.ksplice.com/2010/09/cve-2010-3081/", "refsource": "MISC", "url": "http://blog.ksplice.com/2010/09/cve-2010-3081/" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c41d68a513c71e35a14f66d71782d27a79a81ea6", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c41d68a513c71e35a14f66d71782d27a79a81ea6" }, { "name": "http://isc.sans.edu/diary.html?storyid=9574", "refsource": "MISC", "url": "http://isc.sans.edu/diary.html?storyid=9574" }, { "name": "http://marc.info/?l=oss-security\u0026m=128461522230211\u0026w=2", "refsource": "MISC", "url": "http://marc.info/?l=oss-security\u0026m=128461522230211\u0026w=2" }, { "name": "http://secunia.com/advisories/42384", "refsource": "MISC", "url": "http://secunia.com/advisories/42384" }, { "name": "http://sota.gen.nz/compat1/", "refsource": "MISC", "url": "http://sota.gen.nz/compat1/" }, { "name": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.36-rc4-git2.log", "refsource": "MISC", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.36-rc4-git2.log" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:214", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:214" }, { "name": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:247", "refsource": "MISC", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:247" }, { "name": "http://www.redhat.com/support/errata/RHSA-2010-0758.html", "refsource": "MISC", "url": "http://www.redhat.com/support/errata/RHSA-2010-0758.html" }, { "name": "http://www.securityfocus.com/archive/1/514938/30/30/threaded", "refsource": "MISC", "url": "http://www.securityfocus.com/archive/1/514938/30/30/threaded" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2010-0017.html", "refsource": "MISC", "url": "http://www.vmware.com/security/advisories/VMSA-2010-0017.html" }, { "name": "http://www.vupen.com/english/advisories/2010/3083", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2010/3083" }, { "name": "http://www.vupen.com/english/advisories/2010/3117", "refsource": "MISC", "url": "http://www.vupen.com/english/advisories/2010/3117" }, { "name": "https://access.redhat.com/kb/docs/DOC-40265", "refsource": "MISC", "url": "https://access.redhat.com/kb/docs/DOC-40265" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=634457", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc2:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36:rc3:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.6.35.4", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36:-:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:vmware:esx:4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:vmware:esx:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_server:11:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux_enterprise_desktop:11:sp1:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-3081" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=634457", "refsource": "CONFIRM", "tags": [ "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "name": "http://sota.gen.nz/compat1/", "refsource": "MISC", "tags": [ "Broken Link" ], "url": "http://sota.gen.nz/compat1/" }, { "name": "20100916 Workaround for Ac1db1tch3z exploit.", "refsource": "FULLDISC", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0278.html" }, { "name": "http://isc.sans.edu/diary.html?storyid=9574", "refsource": "MISC", "tags": [ "Patch", "Third Party Advisory" ], "url": "http://isc.sans.edu/diary.html?storyid=9574" }, { "name": "http://blog.ksplice.com/2010/09/cve-2010-3081/", "refsource": "MISC", "tags": [ "Broken Link" ], "url": "http://blog.ksplice.com/2010/09/cve-2010-3081/" }, { "name": "https://access.redhat.com/kb/docs/DOC-40265", "refsource": "CONFIRM", "tags": [ "Exploit", "Patch", "Third Party Advisory" ], "url": "https://access.redhat.com/kb/docs/DOC-40265" }, { "name": "20100916 Ac1db1tch3z vs x86_64 Linux Kernel", "refsource": "FULLDISC", "tags": [ "Broken Link" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0273.html" }, { "name": "[oss-security] 20100916 CVE-2010-3081 kernel: 64-bit Compatibility Mode Stack Pointer Underflow", "refsource": "MLIST", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://marc.info/?l=oss-security\u0026m=128461522230211\u0026w=2" }, { "name": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.36-rc4-git2.log", "refsource": "CONFIRM", "tags": [ "Broken Link" ], "url": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.36-rc4-git2.log" }, { "name": "SUSE-SR:2010:017", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html" }, { "name": "RHSA-2010:0758", "refsource": "REDHAT", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0758.html" }, { "name": "MDVSA-2010:198", "refsource": "MANDRIVA", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198" }, { "name": "MDVSA-2010:214", "refsource": "MANDRIVA", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:214" }, { "name": "MDVSA-2010:247", "refsource": "MANDRIVA", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:247" }, { "name": "RHSA-2010:0882", "refsource": "REDHAT", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0882.html" }, { "name": "SUSE-SA:2010:050", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2010-0017.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2010-0017.html" }, { "name": "ADV-2010-3083", "refsource": "VUPEN", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2010/3083" }, { "name": "RHSA-2010:0842", "refsource": "REDHAT", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2010-0842.html" }, { "name": "42384", "refsource": "SECUNIA", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/42384" }, { "name": "ADV-2010-3117", "refsource": "VUPEN", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2010/3117" }, { "name": "20101130 VMSA-2010-0017 VMware ESX third party update for Service Console kerne", "refsource": "BUGTRAQ", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/514938/30/30/threaded" }, { "name": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html", "refsource": "CONFIRM", "tags": [ "Third Party Advisory" ], "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html" }, { "name": "SUSE-SA:2011:007", "refsource": "SUSE", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { "name": "ADV-2011-0298", "refsource": "VUPEN", "tags": [ "Broken Link" ], "url": "http://www.vupen.com/english/advisories/2011/0298" }, { "name": "43315", "refsource": "SECUNIA", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/43315" }, { "name": "20110211 VMSA-2011-0003 Third party component updates for VMware vCenter Server, vCenter Update Manager, ESXi and ESX", "refsource": "BUGTRAQ", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c41d68a513c71e35a14f66d71782d27a79a81ea6", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c41d68a513c71e35a14f66d71782d27a79a81ea6" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2023-02-13T04:22Z", "publishedDate": "2010-09-24T20:00Z" } } }
ghsa-24vg-fhqp-9wrx
Vulnerability from github
Published
2022-05-13 01:23
Modified
2022-05-13 01:23
Severity ?
Details
The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a "stack pointer underflow" issue, as exploited in the wild in September 2010.
{ "affected": [], "aliases": [ "CVE-2010-3081" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2010-09-24T20:00:00Z", "severity": "HIGH" }, "details": "The compat_alloc_user_space functions in include/asm/compat.h files in the Linux kernel before 2.6.36-rc4-git2 on 64-bit platforms do not properly allocate the userspace memory required for the 32-bit compatibility layer, which allows local users to gain privileges by leveraging the ability of the compat_mc_getsockopt function (aka the MCAST_MSFILTER getsockopt support) to control a certain length value, related to a \"stack pointer underflow\" issue, as exploited in the wild in September 2010.", "id": "GHSA-24vg-fhqp-9wrx", "modified": "2022-05-13T01:23:56Z", "published": "2022-05-13T01:23:55Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3081" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2010:0704" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2010:0705" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2010:0711" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2010:0718" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2010:0719" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2010:0758" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2010:0842" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2010:0882" }, { "type": "WEB", "url": "https://access.redhat.com/kb/docs/DOC-40265" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2010-3081" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=634457" }, { "type": "WEB", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0273.html" }, { "type": "WEB", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-09/0278.html" }, { "type": "WEB", "url": "http://blog.ksplice.com/2010/09/cve-2010-3081" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=c41d68a513c71e35a14f66d71782d27a79a81ea6" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=c41d68a513c71e35a14f66d71782d27a79a81ea6" }, { "type": "WEB", "url": "http://isc.sans.edu/diary.html?storyid=9574" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00003.html" }, { "type": "WEB", "url": "http://lists.opensuse.org/opensuse-security-announce/2011-02/msg00000.html" }, { "type": "WEB", "url": "http://marc.info/?l=oss-security\u0026m=128461522230211\u0026w=2" }, { "type": "WEB", "url": "http://secunia.com/advisories/42384" }, { "type": "WEB", "url": "http://secunia.com/advisories/43315" }, { "type": "WEB", "url": "http://sota.gen.nz/compat1" }, { "type": "WEB", "url": "http://www.kernel.org/pub/linux/kernel/v2.6/snapshots/patch-2.6.36-rc4-git2.log" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:198" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:214" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:247" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0758.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0842.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2010-0882.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/514938/30/30/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/516397/100/0/threaded" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2010-0017.html" }, { "type": "WEB", "url": "http://www.vmware.com/security/advisories/VMSA-2011-0003.html" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/3083" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2010/3117" }, { "type": "WEB", "url": "http://www.vupen.com/english/advisories/2011/0298" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.