Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2010-4250
Vulnerability from cvelistv5
Published
2012-06-21 23:00
Modified
2024-08-07 03:34
Severity ?
EPSS score ?
Summary
Memory leak in the inotify_init1 function in fs/notify/inotify/inotify_user.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory consumption) via vectors involving failed attempts to create files.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T03:34:37.827Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2ae4cc9a16e211c8a128ba10d22a85431f093ab" }, { "name": "[oss-security] 20101124 Re: CVE request: kernel: inotify memory leak", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2010/11/24/11" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://github.com/torvalds/linux/commit/a2ae4cc9a16e211c8a128ba10d22a85431f093ab" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656830" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Memory leak in the inotify_init1 function in fs/notify/inotify/inotify_user.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory consumption) via vectors involving failed attempts to create files." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2012-06-21T23:00:00Z", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2ae4cc9a16e211c8a128ba10d22a85431f093ab" }, { "name": "[oss-security] 20101124 Re: CVE request: kernel: inotify memory leak", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2010/11/24/11" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/torvalds/linux/commit/a2ae4cc9a16e211c8a128ba10d22a85431f093ab" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656830" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2010-4250", "datePublished": "2012-06-21T23:00:00Z", "dateReserved": "2010-11-16T00:00:00Z", "dateUpdated": "2024-08-07T03:34:37.827Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2010-4250\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2012-06-21T23:55:01.647\",\"lastModified\":\"2024-11-21T01:20:32.520\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Memory leak in the inotify_init1 function in fs/notify/inotify/inotify_user.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory consumption) via vectors involving failed attempts to create files.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de p\u00e9rdida de memoria en la funci\u00f3n inotify_init1 en fs/notify/inotify/inotify_user.c en versiones del kernel de Linux anteriores a v2.6.37 permite a usuarios locales provocar una denegaci\u00f3n de servicio (por excesivo consumo de memoria) a trav\u00e9s de vectores relacionados con intentos fallidos de creaci\u00f3n de archivos.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":4.9,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.6.36.4\",\"matchCriteriaId\":\"C03086A2-8EEE-40E3-9A7F-A5303FBF0472\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"907A3F7F-B11D-4CF1-A1B2-A28BBEBF03C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE4657B8-B691-4833-8546-220AD2BA8A7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.36.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2455F37-66D8-4BE1-8739-1A20A2E5375D\"}]}]}],\"references\":[{\"url\":\"http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2ae4cc9a16e211c8a128ba10d22a85431f093ab\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/11/24/11\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=656830\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://github.com/torvalds/linux/commit/a2ae4cc9a16e211c8a128ba10d22a85431f093ab\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Patch\"]},{\"url\":\"http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2ae4cc9a16e211c8a128ba10d22a85431f093ab\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2010/11/24/11\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=656830\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://github.com/torvalds/linux/commit/a2ae4cc9a16e211c8a128ba10d22a85431f093ab\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]}]}}" } }
rhsa-2011_0498
Vulnerability from csaf_redhat
Published
2011-05-10 18:07
Modified
2024-11-22 04:28
Summary
Red Hat Security Advisory: kernel security, bug fix, and enhancement update
Notes
Topic
Updated kernel packages that fix several security issues, various bugs, and
add an enhancement are now available for Red Hat Enterprise Linux 6.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The kernel packages contain the Linux kernel, the core of any Linux
operating system.
Security fixes:
* An integer overflow flaw in ib_uverbs_poll_cq() could allow a local,
unprivileged user to cause a denial of service or escalate their
privileges. (CVE-2010-4649, Important)
* An integer signedness flaw in drm_modeset_ctl() could allow a local,
unprivileged user to cause a denial of service or escalate their
privileges. (CVE-2011-1013, Important)
* The Radeon GPU drivers in the Linux kernel were missing sanity checks for
the Anti Aliasing (AA) resolve register values which could allow a local,
unprivileged user to cause a denial of service or escalate their privileges
on systems using a graphics card from the ATI Radeon R300, R400, or R500
family of cards. (CVE-2011-1016, Important)
* A flaw in dccp_rcv_state_process() could allow a remote attacker to
cause a denial of service, even when the socket was already closed.
(CVE-2011-1093, Important)
* A flaw in the Linux kernel's Stream Control Transmission Protocol (SCTP)
implementation could allow a remote attacker to cause a denial of service
if the sysctl "net.sctp.addip_enable" and "auth_enable" variables were
turned on (they are off by default). (CVE-2011-1573, Important)
* A memory leak in the inotify_init() system call. In some cases, it could
leak a group, which could allow a local, unprivileged user to eventually
cause a denial of service. (CVE-2010-4250, Moderate)
* A missing validation of a null-terminated string data structure element
in bnep_sock_ioctl() could allow a local user to cause an information leak
or a denial of service. (CVE-2011-1079, Moderate)
* An information leak in bcm_connect() in the Controller Area Network (CAN)
Broadcast Manager implementation could allow a local, unprivileged user to
leak kernel mode addresses in "/proc/net/can-bcm". (CVE-2010-4565, Low)
* A flaw was found in the Linux kernel's Integrity Measurement Architecture
(IMA) implementation. When SELinux was disabled, adding an IMA rule which
was supposed to be processed by SELinux would cause ima_match_rules() to
always succeed, ignoring any remaining rules. (CVE-2011-0006, Low)
* A missing initialization flaw in the XFS file system implementation could
lead to an information leak. (CVE-2011-0711, Low)
* Buffer overflow flaws in snd_usb_caiaq_audio_init() and
snd_usb_caiaq_midi_init() could allow a local, unprivileged user with
access to a Native Instruments USB audio device to cause a denial of
service or escalate their privileges. (CVE-2011-0712, Low)
* The start_code and end_code values in "/proc/[pid]/stat" were not
protected. In certain scenarios, this flaw could be used to defeat Address
Space Layout Randomization (ASLR). (CVE-2011-0726, Low)
* A flaw in dev_load() could allow a local user who has the CAP_NET_ADMIN
capability to load arbitrary modules from "/lib/modules/", instead of only
netdev modules. (CVE-2011-1019, Low)
* A flaw in ib_uverbs_poll_cq() could allow a local, unprivileged user to
cause an information leak. (CVE-2011-1044, Low)
* A missing validation of a null-terminated string data structure element
in do_replace() could allow a local user who has the CAP_NET_ADMIN
capability to cause an information leak. (CVE-2011-1080, Low)
Red Hat would like to thank Vegard Nossum for reporting CVE-2010-4250;
Vasiliy Kulikov for reporting CVE-2011-1079, CVE-2011-1019, and
CVE-2011-1080; Dan Rosenberg for reporting CVE-2010-4565 and CVE-2011-0711;
Rafael Dominguez Vega for reporting CVE-2011-0712; and Kees Cook for
reporting CVE-2011-0726.
This update also fixes various bugs and adds an enhancement. Documentation
for these changes will be available shortly from the Technical Notes
document linked to in the References section.
Users should upgrade to these updated packages, which contain backported
patches to resolve these issues, and fix the bugs and add the enhancement
noted in the Technical Notes. The system must be rebooted for this update
to take effect.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues, various bugs, and\nadd an enhancement are now available for Red Hat Enterprise Linux 6.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* An integer overflow flaw in ib_uverbs_poll_cq() could allow a local,\nunprivileged user to cause a denial of service or escalate their\nprivileges. (CVE-2010-4649, Important)\n\n* An integer signedness flaw in drm_modeset_ctl() could allow a local,\nunprivileged user to cause a denial of service or escalate their\nprivileges. (CVE-2011-1013, Important)\n\n* The Radeon GPU drivers in the Linux kernel were missing sanity checks for\nthe Anti Aliasing (AA) resolve register values which could allow a local,\nunprivileged user to cause a denial of service or escalate their privileges\non systems using a graphics card from the ATI Radeon R300, R400, or R500\nfamily of cards. (CVE-2011-1016, Important)\n\n* A flaw in dccp_rcv_state_process() could allow a remote attacker to\ncause a denial of service, even when the socket was already closed.\n(CVE-2011-1093, Important)\n\n* A flaw in the Linux kernel\u0027s Stream Control Transmission Protocol (SCTP)\nimplementation could allow a remote attacker to cause a denial of service\nif the sysctl \"net.sctp.addip_enable\" and \"auth_enable\" variables were\nturned on (they are off by default). (CVE-2011-1573, Important)\n\n* A memory leak in the inotify_init() system call. In some cases, it could\nleak a group, which could allow a local, unprivileged user to eventually\ncause a denial of service. (CVE-2010-4250, Moderate)\n\n* A missing validation of a null-terminated string data structure element\nin bnep_sock_ioctl() could allow a local user to cause an information leak\nor a denial of service. (CVE-2011-1079, Moderate)\n\n* An information leak in bcm_connect() in the Controller Area Network (CAN)\nBroadcast Manager implementation could allow a local, unprivileged user to\nleak kernel mode addresses in \"/proc/net/can-bcm\". (CVE-2010-4565, Low)\n\n* A flaw was found in the Linux kernel\u0027s Integrity Measurement Architecture\n(IMA) implementation. When SELinux was disabled, adding an IMA rule which\nwas supposed to be processed by SELinux would cause ima_match_rules() to\nalways succeed, ignoring any remaining rules. (CVE-2011-0006, Low)\n\n* A missing initialization flaw in the XFS file system implementation could\nlead to an information leak. (CVE-2011-0711, Low)\n\n* Buffer overflow flaws in snd_usb_caiaq_audio_init() and\nsnd_usb_caiaq_midi_init() could allow a local, unprivileged user with\naccess to a Native Instruments USB audio device to cause a denial of\nservice or escalate their privileges. (CVE-2011-0712, Low)\n\n* The start_code and end_code values in \"/proc/[pid]/stat\" were not\nprotected. In certain scenarios, this flaw could be used to defeat Address\nSpace Layout Randomization (ASLR). (CVE-2011-0726, Low)\n\n* A flaw in dev_load() could allow a local user who has the CAP_NET_ADMIN\ncapability to load arbitrary modules from \"/lib/modules/\", instead of only\nnetdev modules. (CVE-2011-1019, Low)\n\n* A flaw in ib_uverbs_poll_cq() could allow a local, unprivileged user to\ncause an information leak. (CVE-2011-1044, Low)\n\n* A missing validation of a null-terminated string data structure element\nin do_replace() could allow a local user who has the CAP_NET_ADMIN\ncapability to cause an information leak. (CVE-2011-1080, Low)\n\nRed Hat would like to thank Vegard Nossum for reporting CVE-2010-4250;\nVasiliy Kulikov for reporting CVE-2011-1079, CVE-2011-1019, and\nCVE-2011-1080; Dan Rosenberg for reporting CVE-2010-4565 and CVE-2011-0711;\nRafael Dominguez Vega for reporting CVE-2011-0712; and Kees Cook for\nreporting CVE-2011-0726.\n\nThis update also fixes various bugs and adds an enhancement. Documentation\nfor these changes will be available shortly from the Technical Notes\ndocument linked to in the References section.\n\nUsers should upgrade to these updated packages, which contain backported\npatches to resolve these issues, and fix the bugs and add the enhancement\nnoted in the Technical Notes. The system must be rebooted for this update\nto take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0498", "url": "https://access.redhat.com/errata/RHSA-2011:0498" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Technical_Notes/ape.html#RHSA-2011-0498", "url": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/Technical_Notes/ape.html#RHSA-2011-0498" }, { "category": "external", "summary": "656830", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656830" }, { "category": "external", "summary": "664544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=664544" }, { "category": "external", "summary": "667912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=667912" }, { "category": "external", "summary": "667916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=667916" }, { "category": "external", "summary": "670850", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=670850" }, { "category": "external", "summary": "677260", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677260" }, { "category": "external", "summary": "677881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677881" }, { "category": "external", "summary": "679925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=679925" }, { "category": "external", "summary": "680000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680000" }, { "category": "external", "summary": "680360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680360" }, { "category": "external", "summary": "681260", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681260" }, { "category": "external", "summary": "681262", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681262" }, { "category": "external", "summary": "682954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=682954" }, { "category": "external", "summary": "683810", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=683810" }, { "category": "external", "summary": "684275", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=684275" }, { "category": "external", "summary": "684569", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=684569" }, { "category": "external", "summary": "691777", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=691777" }, { "category": "external", "summary": "694073", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694073" }, { "category": "external", "summary": "694186", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=694186" }, { "category": "external", "summary": "695383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695383" }, { "category": "external", "summary": "696889", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=696889" }, { "category": "external", "summary": "698109", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=698109" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0498.json" } ], "title": "Red Hat Security Advisory: kernel security, bug fix, and enhancement update", "tracking": { "current_release_date": "2024-11-22T04:28:36+00:00", "generator": { "date": "2024-11-22T04:28:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:0498", "initial_release_date": "2011-05-10T18:07:00+00:00", "revision_history": [ { "date": "2011-05-10T18:07:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-05-10T14:10:04+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:28:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "perf-0:2.6.32-71.29.1.el6.noarch", "product": { "name": "perf-0:2.6.32-71.29.1.el6.noarch", "product_id": "perf-0:2.6.32-71.29.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.32-71.29.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-doc-0:2.6.32-71.29.1.el6.noarch", "product": { "name": "kernel-doc-0:2.6.32-71.29.1.el6.noarch", "product_id": "kernel-doc-0:2.6.32-71.29.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.32-71.29.1.el6?arch=noarch" } } }, { "category": "product_version", "name": "kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "product": { "name": "kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "product_id": "kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-firmware@2.6.32-71.29.1.el6?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "product_id": "kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-71.29.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "product_id": "kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-71.29.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "product": { "name": "kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "product_id": "kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-71.29.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "product": { "name": "kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "product_id": "kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-71.29.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-71.29.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "product": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "product_id": "kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-x86_64@2.6.32-71.29.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-71.29.1.el6.x86_64", "product": { "name": "kernel-0:2.6.32-71.29.1.el6.x86_64", "product_id": "kernel-0:2.6.32-71.29.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-71.29.1.el6?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "product": { "name": "kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "product_id": "kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-71.29.1.el6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.32-71.29.1.el6.src", "product": { "name": "kernel-0:2.6.32-71.29.1.el6.src", "product_id": "kernel-0:2.6.32-71.29.1.el6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-71.29.1.el6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "product": { "name": "kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "product_id": "kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-71.29.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "product": { "name": "kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "product_id": "kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-71.29.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "product": { "name": "kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "product_id": "kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-i686@2.6.32-71.29.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-71.29.1.el6.i686", "product": { "name": "kernel-headers-0:2.6.32-71.29.1.el6.i686", "product_id": "kernel-headers-0:2.6.32-71.29.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-71.29.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-71.29.1.el6.i686", "product": { "name": "kernel-debug-0:2.6.32-71.29.1.el6.i686", "product_id": "kernel-debug-0:2.6.32-71.29.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-71.29.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "product_id": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-71.29.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-71.29.1.el6.i686", "product": { "name": "kernel-0:2.6.32-71.29.1.el6.i686", "product_id": "kernel-0:2.6.32-71.29.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-71.29.1.el6?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-71.29.1.el6.i686", "product": { "name": "kernel-devel-0:2.6.32-71.29.1.el6.i686", "product_id": "kernel-devel-0:2.6.32-71.29.1.el6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-71.29.1.el6?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "product": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "product_id": "kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-ppc64@2.6.32-71.29.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "product": { "name": "kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "product_id": "kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-bootwrapper@2.6.32-71.29.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "product_id": "kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-71.29.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "product_id": "kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-71.29.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "product": { "name": "kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "product_id": "kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-71.29.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "product": { "name": "kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "product_id": "kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-71.29.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-71.29.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-71.29.1.el6.ppc64", "product": { "name": "kernel-0:2.6.32-71.29.1.el6.ppc64", "product_id": "kernel-0:2.6.32-71.29.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-71.29.1.el6?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "product": { "name": "kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "product_id": "kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-71.29.1.el6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "product_id": "kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.32-71.29.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "product": { "name": "kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "product_id": "kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.32-71.29.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "product": { "name": "kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "product_id": "kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.32-71.29.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "product": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "product_id": "kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common-s390x@2.6.32-71.29.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.32-71.29.1.el6.s390x", "product": { "name": "kernel-headers-0:2.6.32-71.29.1.el6.s390x", "product_id": "kernel-headers-0:2.6.32-71.29.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.32-71.29.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "product": { "name": "kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "product_id": "kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.32-71.29.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.32-71.29.1.el6.s390x", "product": { "name": "kernel-debug-0:2.6.32-71.29.1.el6.s390x", "product_id": "kernel-debug-0:2.6.32-71.29.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.32-71.29.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.32-71.29.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.32-71.29.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.32-71.29.1.el6.s390x", "product": { "name": "kernel-0:2.6.32-71.29.1.el6.s390x", "product_id": "kernel-0:2.6.32-71.29.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.32-71.29.1.el6?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.32-71.29.1.el6.s390x", "product": { "name": "kernel-devel-0:2.6.32-71.29.1.el6.s390x", "product_id": "kernel-devel-0:2.6.32-71.29.1.el6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.32-71.29.1.el6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.29.1.el6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-0:2.6.32-71.29.1.el6.src" }, "product_reference": "kernel-0:2.6.32-71.29.1.el6.src", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-71.29.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-71.29.1.el6.noarch", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-71.29.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-71.29.1.el6.noarch as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client:perf-0:2.6.32-71.29.1.el6.noarch" }, "product_reference": "perf-0:2.6.32-71.29.1.el6.noarch", "relates_to_product_reference": "6Client" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.29.1.el6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src" }, "product_reference": "kernel-0:2.6.32-71.29.1.el6.src", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-71.29.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-71.29.1.el6.noarch", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-71.29.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-71.29.1.el6.noarch as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch" }, "product_reference": "perf-0:2.6.32-71.29.1.el6.noarch", "relates_to_product_reference": "6ComputeNode" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.29.1.el6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-0:2.6.32-71.29.1.el6.src" }, "product_reference": "kernel-0:2.6.32-71.29.1.el6.src", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-71.29.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-71.29.1.el6.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-71.29.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-71.29.1.el6.noarch as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server:perf-0:2.6.32-71.29.1.el6.noarch" }, "product_reference": "perf-0:2.6.32-71.29.1.el6.noarch", "relates_to_product_reference": "6Server" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.29.1.el6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-0:2.6.32-71.29.1.el6.src" }, "product_reference": "kernel-0:2.6.32-71.29.1.el6.src", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-debug-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-debug-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-devel-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-devel-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.32-71.29.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch" }, "product_reference": "kernel-doc-0:2.6.32-71.29.1.el6.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-firmware-0:2.6.32-71.29.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch" }, "product_reference": "kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.29.1.el6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686" }, "product_reference": "kernel-headers-0:2.6.32-71.29.1.el6.i686", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.29.1.el6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64" }, "product_reference": "kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-headers-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.32-71.29.1.el6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64" }, "product_reference": "kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "relates_to_product_reference": "6Workstation" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.32-71.29.1.el6.noarch as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" }, "product_reference": "perf-0:2.6.32-71.29.1.el6.noarch", "relates_to_product_reference": "6Workstation" } ] }, "vulnerabilities": [ { "acknowledgments": [ { "names": [ "Vegard Nossum" ] } ], "cve": "CVE-2010-4250", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2010-11-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "656830" } ], "notes": [ { "category": "description", "text": "Memory leak in the inotify_init1 function in fs/notify/inotify/inotify_user.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory consumption) via vectors involving failed attempts to create files.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: inotify memory leak", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 4 and 5. It was addressed in Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0330.html. A future kernel update in Red Hat Enterprise Linux 6 may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4250" }, { "category": "external", "summary": "RHBZ#656830", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656830" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4250", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4250" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4250", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4250" } ], "release_date": "2010-11-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-05-10T18:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0498" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: inotify memory leak" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4565", "discovery_date": "2010-11-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "664544" } ], "notes": [ { "category": "description", "text": "The bcm_connect function in net/can/bcm.c (aka the Broadcast Manager) in the Controller Area Network (CAN) implementation in the Linux kernel 2.6.36 and earlier creates a publicly accessible file with a filename containing a kernel memory address, which allows local users to obtain potentially sensitive information about kernel memory use by listing this filename.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: CAN info leak", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and 5 did not\ninclude CAN bus subsystem support, and therefore are not affected by this\nissue. This has been addressed in Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0330.html. A future kernel update in Red Hat Enterprise Linux 6 may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4565" }, { "category": "external", "summary": "RHBZ#664544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=664544" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4565", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4565" } ], "release_date": "2010-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-05-10T18:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0498" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: CAN info leak" }, { "cve": "CVE-2010-4649", "discovery_date": "2011-01-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "667916" } ], "notes": [ { "category": "description", "text": "Integer overflow in the ib_uverbs_poll_cq function in drivers/infiniband/core/uverbs_cmd.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large value of a certain structure member.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: IB/uverbs: Handle large number of entries in poll CQ", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4649" }, { "category": "external", "summary": "RHBZ#667916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=667916" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4649", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4649" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4649", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4649" } ], "release_date": "2010-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-05-10T18:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0498" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: IB/uverbs: Handle large number of entries in poll CQ" }, { "cve": "CVE-2011-0006", "discovery_date": "2011-01-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "667912" } ], "notes": [ { "category": "description", "text": "The ima_lsm_rule_init function in security/integrity/ima/ima_policy.c in the Linux kernel before 2.6.37, when the Linux Security Modules (LSM) framework is disabled, allows local users to bypass Integrity Measurement Architecture (IMA) rules in opportunistic circumstances by leveraging an administrator\u0027s addition of an IMA rule for LSM.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ima: fix add LSM rule bug", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG are not affected by this issue. A future kernel update in Red Hat Enterprise Linux 6 may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0006" }, { "category": "external", "summary": "RHBZ#667912", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=667912" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0006", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0006" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0006", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0006" } ], "release_date": "2011-01-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-05-10T18:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0498" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 1.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: ima: fix add LSM rule bug" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2011-0711", "discovery_date": "2011-02-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677260" } ], "notes": [ { "category": "description", "text": "The xfs_fs_geometry function in fs/xfs/xfs_fsops.c in the Linux kernel before 2.6.38-rc6-git3 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via an FSGEOMETRY_V1 ioctl call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not have support for the XFS file system. This has been addressed in Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise\nMRG via https://rhn.redhat.com/errata/RHSA-2011-0927.html, https://rhn.redhat.com/errata/RHSA-2011-0498.html, and https://rhn.redhat.com/errata/RHSA-2011-0500.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0711" }, { "category": "external", "summary": "RHBZ#677260", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677260" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0711", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0711" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0711", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0711" } ], "release_date": "2011-02-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-05-10T18:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0498" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: xfs: prevent leaking uninitialized stack memory in FSGEOMETRY_V1" }, { "acknowledgments": [ { "names": [ "Rafael Dominguez Vega" ] } ], "cve": "CVE-2011-0712", "discovery_date": "2011-02-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "677881" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in the caiaq Native Instruments USB audio functionality in the Linux kernel before 2.6.38-rc4-next-20110215 might allow attackers to cause a denial of service or possibly have unspecified other impact via a long USB device name, related to (1) the snd_usb_caiaq_audio_init function in sound/usb/caiaq/audio.c and (2) the snd_usb_caiaq_midi_init function in sound/usb/caiaq/midi.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ALSA: caiaq - Fix possible string-buffer overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the Linux kernel as shipped with Red Hat Enterprise Linux 4 and 5 as they did not backport the driver for Native Instruments USB audio devices. It did not affect the Linux kernel as shipped with Red Hat Enterprise MRG as it did not enable support for this driver. This has been addressed in Red Hat Enterprise Linux 6 via https://rhn.redhat.com/errata/RHSA-2011-0498.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0712" }, { "category": "external", "summary": "RHBZ#677881", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=677881" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0712", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0712" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0712", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0712" } ], "release_date": "2011-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-05-10T18:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0498" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: ALSA: caiaq - Fix possible string-buffer overflow" }, { "acknowledgments": [ { "names": [ "Kees Cook" ] } ], "cve": "CVE-2011-0726", "discovery_date": "2011-03-13T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "684569" } ], "notes": [ { "category": "description", "text": "The do_task_stat function in fs/proc/array.c in the Linux kernel before 2.6.39-rc1 does not perform an expected uid check, which makes it easier for local users to defeat the ASLR protection mechanism by reading the start_code and end_code fields in the /proc/#####/stat file for a process executing a PIE binary.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: proc: protect mm start_code/end_code in /proc/pid/stat", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle,\nhttps://access.redhat.com/support/policy/updates/errata/, therefore the fix for\nthis issue is not currently planned to be included in the future updates. Future kernel updates in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0726" }, { "category": "external", "summary": "RHBZ#684569", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=684569" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0726", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0726" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0726", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0726" } ], "release_date": "2011-03-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-05-10T18:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0498" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: proc: protect mm start_code/end_code in /proc/pid/stat" }, { "cve": "CVE-2011-1013", "discovery_date": "2011-02-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "679925" } ], "notes": [ { "category": "description", "text": "Integer signedness error in the drm_modeset_ctl function in (1) drivers/gpu/drm/drm_irq.c in the Direct Rendering Manager (DRM) subsystem in the Linux kernel before 2.6.38 and (2) sys/dev/pci/drm/drm_irq.c in the kernel in OpenBSD before 4.9 allows local users to trigger out-of-bounds write operations, and consequently cause a denial of service (system crash) or possibly have unspecified other impact, via a crafted num_crtcs (aka vb_num) structure member in an ioctl argument.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: drm_modeset_ctl signedness issue", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of the Linux kernel as shipped with Red\nHat Enterprise Linux 4, 5 as they did not include the affected functionality. A future update in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1013" }, { "category": "external", "summary": "RHBZ#679925", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=679925" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1013", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1013" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1013", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1013" } ], "release_date": "2011-02-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-05-10T18:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0498" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: drm_modeset_ctl signedness issue" }, { "cve": "CVE-2011-1016", "discovery_date": "2011-02-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "680000" } ], "notes": [ { "category": "description", "text": "The Radeon GPU drivers in the Linux kernel before 2.6.38-rc5 do not properly validate data related to the AA resolve registers, which allows local users to write to arbitrary memory locations associated with (1) Video RAM (aka VRAM) or (2) the Graphics Translation Table (GTT) via crafted values.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: drm/radeon/kms: check AA resolve registers on r300", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 4, 5, and Red Hat Enterprise MRG as they did not backport the upstream commits fff1ce4d and 45e4039c that introduced this issue. This has been addressed in Red Hat Enterprise Linux 6 via https://rhn.redhat.com/errata/RHSA-2011-0498.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1016" }, { "category": "external", "summary": "RHBZ#680000", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680000" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1016", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1016" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1016", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1016" } ], "release_date": "2011-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-05-10T18:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0498" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: drm/radeon/kms: check AA resolve registers on r300" }, { "acknowledgments": [ { "names": [ "Vasiliy Kulikov" ], "organization": "Openwall" } ], "cve": "CVE-2011-1019", "discovery_date": "2011-02-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "680360" } ], "notes": [ { "category": "description", "text": "The dev_load function in net/core/dev.c in the Linux kernel before 2.6.38 allows local users to bypass an intended CAP_SYS_MODULE capability requirement and load arbitrary modules by leveraging the CAP_NET_ADMIN capability.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: CAP_SYS_MODULE bypass via CAP_NET_ADMIN", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the Linux kernel as shipped with Red Hat Enterprise Linux 4 and 5 as they did not backport the upstream commit a8f80e8f that introduced this flaw. This has been addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0498.html and https://rhn.redhat.com/errata/RHSA-2011-0500.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1019" }, { "category": "external", "summary": "RHBZ#680360", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=680360" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1019", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1019" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1019", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1019" } ], "release_date": "2011-02-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-05-10T18:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0498" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 1.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: CAP_SYS_MODULE bypass via CAP_NET_ADMIN" }, { "cve": "CVE-2011-1044", "discovery_date": "2011-01-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "667916" } ], "notes": [ { "category": "description", "text": "The ib_uverbs_poll_cq function in drivers/infiniband/core/uverbs_cmd.c in the Linux kernel before 2.6.37 does not initialize a certain response buffer, which allows local users to obtain potentially sensitive information from kernel memory via vectors that cause this buffer to be only partially filled, a different vulnerability than CVE-2010-4649.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: IB/uverbs: Handle large number of entries in poll CQ", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1044" }, { "category": "external", "summary": "RHBZ#667916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=667916" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1044", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1044" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1044", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1044" } ], "release_date": "2010-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-05-10T18:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0498" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: IB/uverbs: Handle large number of entries in poll CQ" }, { "acknowledgments": [ { "names": [ "Vasiliy Kulikov" ], "organization": "Openwall" } ], "cve": "CVE-2011-1079", "discovery_date": "2011-02-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "681260" } ], "notes": [ { "category": "description", "text": "The bnep_sock_ioctl function in net/bluetooth/bnep/sock.c in the Linux kernel before 2.6.39 does not ensure that a certain device field ends with a \u0027\\0\u0027 character, which allows local users to obtain potentially sensitive information from kernel stack memory, or cause a denial of service (BUG and system crash), via a BNEPCONNADD command.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: bnep device field missing NULL terminator", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1079" }, { "category": "external", "summary": "RHBZ#681260", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681260" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1079", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1079" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1079", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1079" } ], "release_date": "2011-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-05-10T18:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0498" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:S/C:P/I:N/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: bnep device field missing NULL terminator" }, { "acknowledgments": [ { "names": [ "Vasiliy Kulikov" ], "organization": "Openwall" } ], "cve": "CVE-2011-1080", "discovery_date": "2011-02-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "681262" } ], "notes": [ { "category": "description", "text": "The do_replace function in net/bridge/netfilter/ebtables.c in the Linux kernel before 2.6.39 does not ensure that a certain name field ends with a \u0027\\0\u0027 character, which allows local users to obtain potentially sensitive information from kernel stack memory by leveraging the CAP_NET_ADMIN capability to replace a table, and then reading a modprobe command line.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: ebtables stack infoleak", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1080" }, { "category": "external", "summary": "RHBZ#681262", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=681262" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1080", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1080" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1080", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1080" } ], "release_date": "2011-02-14T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-05-10T18:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0498" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "NONE", "baseScore": 1.7, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:S/C:P/I:N/A:N", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: ebtables stack infoleak" }, { "cve": "CVE-2011-1093", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2011-03-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "682954" } ], "notes": [ { "category": "description", "text": "The dccp_rcv_state_process function in net/dccp/input.c in the Datagram Congestion Control Protocol (DCCP) implementation in the Linux kernel before 2.6.38 does not properly handle packets for a CLOSED endpoint, which allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) by sending a DCCP-Close packet followed by a DCCP-Reset packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: dccp: fix oops on Reset after close", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not include support for the DCCP protocol. Future updates in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1093" }, { "category": "external", "summary": "RHBZ#682954", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=682954" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1093", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1093" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1093", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1093" } ], "release_date": "2011-03-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-05-10T18:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0498" }, { "category": "workaround", "details": "For users that do not run applications that use DCCP, you can prevent the dccp\nmodule from being loaded by adding the following entry to the end of the\n/etc/modprobe.d/blacklist file:\n\nblacklist dccp\n\nThis way, the dccp module cannot be loaded accidentally, which may occur if an\napplication that requires DCCP is started. A reboot is not necessary for this\nchange to take effect but do make sure the module is not loaded in the first\nplace. You can verify that by running:\n\nlsmod | grep dccp\n\nYou may also consider removing the CAP_SYS_MODULE capability from the current\nglobal capability set to prevent kernel modules from being loaded or unloaded.\nThe CAP_SYS_MODULE has a capability number of 16 (see linux/capability.h). The\ndefault value has all the bits set. To remove this capability, you have to\nclear the 16th bit of the default 32-bit value, e.g. 0xffffff ^ (1 \u003c\u003c 16):\n\necho 0xFFFEFFFF \u003e /proc/sys/kernel/cap-bound", "product_ids": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: dccp: fix oops on Reset after close" }, { "cve": "CVE-2011-1573", "discovery_date": "2011-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "695383" } ], "notes": [ { "category": "description", "text": "net/sctp/sm_make_chunk.c in the Linux kernel before 2.6.34, when addip_enable and auth_enable are used, does not consider the amount of zero padding during calculation of chunk lengths for (1) INIT and (2) INIT ACK chunks, which allows remote attackers to cause a denial of service (OOPS) via crafted packet data.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sctp: fix to calc the INIT/INIT-ACK chunk length correctly to set", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not support SCTP authentication and extended parameters. It did not affect the version of Linux kernel as shipped with Red Hat Enterprise MRG as it has backported the upstream commit a8170c35 that addressed this. This has been addressed in Red Hat Enterprise Linux 5 and 6 via https://rhn.redhat.com/errata/RHSA-2011-0927.html and https://rhn.redhat.com/errata/RHSA-2011-0498.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1573" }, { "category": "external", "summary": "RHBZ#695383", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=695383" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1573", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1573" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1573", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1573" } ], "release_date": "2010-04-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-05-10T18:07:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:0498" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 5.4, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:H/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "6Client:kernel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-0:2.6.32-71.29.1.el6.src", "6Client:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Client:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Client:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Client:perf-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.src", "6ComputeNode:kernel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6ComputeNode:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6ComputeNode:perf-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-0:2.6.32-71.29.1.el6.src", "6Server:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Server:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Server:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Server:perf-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-0:2.6.32-71.29.1.el6.src", "6Workstation:kernel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-bootwrapper-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debug-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-debuginfo-common-i686-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-debuginfo-common-ppc64-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-debuginfo-common-s390x-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-debuginfo-common-x86_64-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-devel-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-doc-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-firmware-0:2.6.32-71.29.1.el6.noarch", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.i686", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.ppc64", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-headers-0:2.6.32-71.29.1.el6.x86_64", "6Workstation:kernel-kdump-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-debuginfo-0:2.6.32-71.29.1.el6.s390x", "6Workstation:kernel-kdump-devel-0:2.6.32-71.29.1.el6.s390x", "6Workstation:perf-0:2.6.32-71.29.1.el6.noarch" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: sctp: fix to calc the INIT/INIT-ACK chunk length correctly to set" } ] }
rhsa-2011_0330
Vulnerability from csaf_redhat
Published
2011-03-10 20:01
Modified
2024-11-22 04:28
Summary
Red Hat Security Advisory: kernel-rt security and bug fix update
Notes
Topic
Updated kernel-rt packages that fix multiple security issues and three bugs
are now available for Red Hat Enterprise MRG 1.3.
The Red Hat Security Response Team has rated this update as having
important security impact. Common Vulnerability Scoring System (CVSS) base
scores, which give detailed severity ratings, are available for each
vulnerability from the CVE links in the References section.
Details
The kernel-rt packages contain the Linux kernel, the core of any Linux
operating system.
Security fixes:
* Missing boundary checks in the PPP over L2TP sockets implementation could
allow a local, unprivileged user to cause a denial of service or escalate
their privileges. (CVE-2010-4160, Important)
* Integer overflow in ib_uverbs_poll_cq() could allow a local, unprivileged
user to cause a denial of service or escalate their privileges.
(CVE-2010-4649, Important)
* Missing boundary check in dvb_ca_ioctl() in the av7110 module. On systems
using old DVB cards requiring the av7110 module, a local, unprivileged user
could use this flaw to cause a denial of service or escalate their
privileges. (CVE-2011-0521, Important)
* Flaw in tcf_act_police_dump() in the network traffic policing
implementation could allow a local, unprivileged user to cause an
information leak. (CVE-2010-3477, Moderate)
* Missing boundary checks in the block layer implementation could allow a
local, unprivileged user to cause a denial of service. (CVE-2010-4162,
CVE-2010-4163, CVE-2010-4668, Moderate)
* Divide-by-zero flaw in tcp_select_initial_window() in the Linux kernel's
TCP/IP protocol suite implementation could allow a local, unprivileged user
to cause a denial of service. (CVE-2010-4165, Moderate)
* NULL pointer dereference flaw in the Bluetooth HCI UART driver could
allow a local, unprivileged user to cause a denial of service.
(CVE-2010-4242, Moderate)
* Flaw in the CPU time clocks implementation for the POSIX clock interface
could allow a local, unprivileged user to cause a denial of service.
(CVE-2010-4248, Moderate)
* Flaw in the garbage collector for AF_UNIX sockets could allow a local,
unprivileged user to trigger a denial of service (out-of-memory condition).
(CVE-2010-4249, Moderate)
* Memory leak in the inotify_init() system call. In some cases, it could
leak a group, which could allow a local, unprivileged user to eventually
cause a denial of service. (CVE-2010-4250, Moderate)
* /sys/kernel/debug/acpi/custom_method had world-writable permissions,
which could allow a local, unprivileged user to escalate their privileges.
Note: The debugfs file system must be mounted locally to exploit this
issue. It is not mounted by default. (CVE-2010-4347, Moderate)
* Heap overflow in iowarrior_write() could allow a user with access to an
IO-Warrior USB device to cause a denial of service or escalate their
privileges. (CVE-2010-4656, Moderate)
* Missing security check in the Linux kernel's implementation of the
install_special_mapping routine could allow a local, unprivileged user to
bypass the mmap_min_addr protection mechanism. (CVE-2010-4346, Low)
* Information leak in bcm_connect() in the Controller Area Network (CAN)
Broadcast Manager implementation could allow a local, unprivileged user to
leak kernel mode addresses in /proc/net/can-bcm. (CVE-2010-4565, Low)
* A logic error in orinoco_ioctl_set_auth() in the Linux kernel's ORiNOCO
wireless extensions support implementation could render TKIP
countermeasures ineffective when it is enabled, as it enabled the card
instead of shutting it down. (CVE-2010-4648, Low)
* Missing initialization flaw in ethtool_get_regs() could allow a local
user who has the CAP_NET_ADMIN capability to cause an information leak.
(CVE-2010-4655, Low)
* Flaw in ib_uverbs_poll_cq() could allow a local, unprivileged user to
cause an information leak. (CVE-2011-1044, Low)
Red Hat would like to thank Dan Rosenberg for reporting CVE-2010-4160,
CVE-2010-4162, CVE-2010-4163, CVE-2010-4668, and CVE-2010-4565; Steve Chen
for reporting CVE-2010-4165; Alan Cox for reporting CVE-2010-4242; Vegard
Nossum for reporting CVE-2010-4249 and CVE-2010-4250; Kees Cook for
reporting CVE-2010-4656 and CVE-2010-4655; and Tavis Ormandy for reporting
CVE-2010-4346.
This update also fixes three bugs. Documentation for these bug fixes will
be available shortly from the Technical Notes document linked to in the
References section.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel-rt packages that fix multiple security issues and three bugs\nare now available for Red Hat Enterprise MRG 1.3.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel-rt packages contain the Linux kernel, the core of any Linux\noperating system.\n\nSecurity fixes:\n\n* Missing boundary checks in the PPP over L2TP sockets implementation could\nallow a local, unprivileged user to cause a denial of service or escalate\ntheir privileges. (CVE-2010-4160, Important)\n\n* Integer overflow in ib_uverbs_poll_cq() could allow a local, unprivileged\nuser to cause a denial of service or escalate their privileges.\n(CVE-2010-4649, Important)\n\n* Missing boundary check in dvb_ca_ioctl() in the av7110 module. On systems\nusing old DVB cards requiring the av7110 module, a local, unprivileged user\ncould use this flaw to cause a denial of service or escalate their\nprivileges. (CVE-2011-0521, Important)\n\n* Flaw in tcf_act_police_dump() in the network traffic policing\nimplementation could allow a local, unprivileged user to cause an\ninformation leak. (CVE-2010-3477, Moderate)\n\n* Missing boundary checks in the block layer implementation could allow a\nlocal, unprivileged user to cause a denial of service. (CVE-2010-4162,\nCVE-2010-4163, CVE-2010-4668, Moderate)\n\n* Divide-by-zero flaw in tcp_select_initial_window() in the Linux kernel\u0027s\nTCP/IP protocol suite implementation could allow a local, unprivileged user\nto cause a denial of service. (CVE-2010-4165, Moderate)\n\n* NULL pointer dereference flaw in the Bluetooth HCI UART driver could\nallow a local, unprivileged user to cause a denial of service.\n(CVE-2010-4242, Moderate)\n\n* Flaw in the CPU time clocks implementation for the POSIX clock interface\ncould allow a local, unprivileged user to cause a denial of service.\n(CVE-2010-4248, Moderate)\n\n* Flaw in the garbage collector for AF_UNIX sockets could allow a local,\nunprivileged user to trigger a denial of service (out-of-memory condition).\n(CVE-2010-4249, Moderate)\n\n* Memory leak in the inotify_init() system call. In some cases, it could\nleak a group, which could allow a local, unprivileged user to eventually\ncause a denial of service. (CVE-2010-4250, Moderate)\n\n* /sys/kernel/debug/acpi/custom_method had world-writable permissions,\nwhich could allow a local, unprivileged user to escalate their privileges.\nNote: The debugfs file system must be mounted locally to exploit this\nissue. It is not mounted by default. (CVE-2010-4347, Moderate)\n\n* Heap overflow in iowarrior_write() could allow a user with access to an\nIO-Warrior USB device to cause a denial of service or escalate their\nprivileges. (CVE-2010-4656, Moderate)\n\n* Missing security check in the Linux kernel\u0027s implementation of the\ninstall_special_mapping routine could allow a local, unprivileged user to\nbypass the mmap_min_addr protection mechanism. (CVE-2010-4346, Low)\n\n* Information leak in bcm_connect() in the Controller Area Network (CAN)\nBroadcast Manager implementation could allow a local, unprivileged user to\nleak kernel mode addresses in /proc/net/can-bcm. (CVE-2010-4565, Low)\n\n* A logic error in orinoco_ioctl_set_auth() in the Linux kernel\u0027s ORiNOCO\nwireless extensions support implementation could render TKIP\ncountermeasures ineffective when it is enabled, as it enabled the card\ninstead of shutting it down. (CVE-2010-4648, Low)\n\n* Missing initialization flaw in ethtool_get_regs() could allow a local\nuser who has the CAP_NET_ADMIN capability to cause an information leak.\n(CVE-2010-4655, Low)\n\n* Flaw in ib_uverbs_poll_cq() could allow a local, unprivileged user to\ncause an information leak. (CVE-2011-1044, Low)\n\nRed Hat would like to thank Dan Rosenberg for reporting CVE-2010-4160,\nCVE-2010-4162, CVE-2010-4163, CVE-2010-4668, and CVE-2010-4565; Steve Chen\nfor reporting CVE-2010-4165; Alan Cox for reporting CVE-2010-4242; Vegard\nNossum for reporting CVE-2010-4249 and CVE-2010-4250; Kees Cook for\nreporting CVE-2010-4656 and CVE-2010-4655; and Tavis Ormandy for reporting\nCVE-2010-4346.\n\nThis update also fixes three bugs. Documentation for these bug fixes will\nbe available shortly from the Technical Notes document linked to in the\nReferences section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:0330", "url": "https://access.redhat.com/errata/RHSA-2011:0330" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/1.3/html/Technical_Notes/chap-Package_Updates.html#RHSA-2011-0330", "url": "http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_MRG/1.3/html/Technical_Notes/chap-Package_Updates.html#RHSA-2011-0330" }, { "category": "external", "summary": "636386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=636386" }, { "category": "external", "summary": "641410", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641410" }, { "category": "external", "summary": "651892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651892" }, { "category": "external", "summary": "652508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=652508" }, { "category": "external", "summary": "652529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=652529" }, { "category": "external", "summary": "652957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=652957" }, { "category": "external", "summary": "656264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656264" }, { "category": "external", "summary": "656756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656756" }, { "category": "external", "summary": "656830", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656830" }, { "category": "external", "summary": "659574", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=659574" }, { "category": "external", "summary": "662189", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=662189" }, { "category": "external", "summary": "663542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663542" }, { "category": "external", "summary": "664544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=664544" }, { "category": "external", "summary": "667907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=667907" }, { "category": "external", "summary": "667916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=667916" }, { "category": "external", "summary": "672398", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672398" }, { "category": "external", "summary": "672420", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672420" }, { "category": "external", "summary": "672428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672428" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0330.json" } ], "title": "Red Hat Security Advisory: kernel-rt security and bug fix update", "tracking": { "current_release_date": "2024-11-22T04:28:26+00:00", "generator": { "date": "2024-11-22T04:28:26+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:0330", "initial_release_date": "2011-03-10T20:01:00+00:00", "revision_history": [ { "date": "2011-03-10T20:01:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-03-10T15:04:13+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:28:26+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "MRG Realtime for RHEL 5 Server", "product": { "name": "MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_mrg:1::el5" } } } ], "category": "product_family", "name": "Red Hat Enterprise MRG for RHEL-5" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "product": { "name": "kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "product_id": "kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-doc@2.6.33.7-rt29.55.el5rt?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "product": { "name": "kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "product_id": "kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.33.7-rt29.55.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "product": { "name": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "product_id": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.33.7-rt29.55.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "product": { "name": "kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "product_id": "kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.33.7-rt29.55.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "product": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.33.7-rt29.55.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "product": { "name": "kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "product_id": "kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.33.7-rt29.55.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "product": { "name": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "product_id": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.33.7-rt29.55.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "product": { "name": "kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "product_id": "kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.33.7-rt29.55.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "product": { "name": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "product_id": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.33.7-rt29.55.el5rt?arch=i686" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "product": { "name": "perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "product_id": "perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.33.7-rt29.55.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "product": { "name": "kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "product_id": "kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.33.7-rt29.55.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "product": { "name": "kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "product_id": "kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.33.7-rt29.55.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "product": { "name": "kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "product_id": "kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.33.7-rt29.55.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "product": { "name": "kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "product_id": "kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.33.7-rt29.55.el5rt?arch=i686" } } }, { "category": "product_version", "name": "perf-0:2.6.33.7-rt29.55.el5rt.i686", "product": { "name": "perf-0:2.6.33.7-rt29.55.el5rt.i686", "product_id": "perf-0:2.6.33.7-rt29.55.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.33.7-rt29.55.el5rt?arch=i686" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "product": { "name": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "product_id": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.33.7-rt29.55.el5rt?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "product": { "name": "kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_id": "kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo@2.6.33.7-rt29.55.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_id": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-devel@2.6.33.7-rt29.55.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "product": { "name": "kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_id": "kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-devel@2.6.33.7-rt29.55.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_id": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla-debuginfo@2.6.33.7-rt29.55.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "product": { "name": "kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_id": "kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug@2.6.33.7-rt29.55.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "product": { "name": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_id": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-debuginfo@2.6.33.7-rt29.55.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "product": { "name": "kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_id": "kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-devel@2.6.33.7-rt29.55.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "product": { "name": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_id": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debuginfo-common@2.6.33.7-rt29.55.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "product": { "name": "perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_id": "perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf-debuginfo@2.6.33.7-rt29.55.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "product": { "name": "kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_id": "kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-debug-devel@2.6.33.7-rt29.55.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "product": { "name": "kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_id": "kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.33.7-rt29.55.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "product": { "name": "kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_id": "kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-vanilla@2.6.33.7-rt29.55.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "product": { "name": "kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_id": "kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace@2.6.33.7-rt29.55.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "product": { "name": "perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_id": "perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/perf@2.6.33.7-rt29.55.el5rt?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "product": { "name": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_id": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt-trace-debuginfo@2.6.33.7-rt29.55.el5rt?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "product": { "name": "kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "product_id": "kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-rt@2.6.33.7-rt29.55.el5rt?arch=src" } } } ], "category": "architecture", "name": "src" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686" }, "product_reference": "kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.33.7-rt29.55.el5rt.src as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src" }, "product_reference": "kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64" }, "product_reference": "kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686" }, "product_reference": "kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686" }, "product_reference": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686" }, "product_reference": "kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64" }, "product_reference": "kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686" }, "product_reference": "kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686" }, "product_reference": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64" }, "product_reference": "kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686" }, "product_reference": "kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64" }, "product_reference": "kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch" }, "product_reference": "kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686" }, "product_reference": "kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686" }, "product_reference": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686" }, "product_reference": "kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64" }, "product_reference": "kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686" }, "product_reference": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64" }, "product_reference": "kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.33.7-rt29.55.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686" }, "product_reference": "perf-0:2.6.33.7-rt29.55.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-0:2.6.33.7-rt29.55.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64" }, "product_reference": "perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686" }, "product_reference": "perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" }, { "category": "default_component_of", "full_product_name": { "name": "perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64 as a component of MRG Realtime for RHEL 5 Server", "product_id": "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" }, "product_reference": "perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "relates_to_product_reference": "5Server-MRG-Realtime-1.0" } ] }, "vulnerabilities": [ { "cve": "CVE-2010-3477", "discovery_date": "2010-09-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "636386" } ], "notes": [ { "category": "description", "text": "The tcf_act_police_dump function in net/sched/act_police.c in the actions implementation in the network queueing functionality in the Linux kernel before 2.6.36-rc4 does not properly initialize certain structure members, which allows local users to obtain potentially sensitive information from kernel memory via vectors involving a dump operation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2942.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: net/sched/act_police.c infoleak", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-3477" }, { "category": "external", "summary": "RHBZ#636386", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=636386" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-3477", "url": "https://www.cve.org/CVERecord?id=CVE-2010-3477" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-3477", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-3477" } ], "release_date": "2010-09-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-10T20:01:00+00:00", "details": "Users should upgrade to these updated kernel-rt packages. They are\nbased on upstream version 2.6.33.7.2-rt30 (despite package naming) and\ncorrect these issues. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0330" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: net/sched/act_police.c infoleak" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4160", "discovery_date": "2010-11-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "651892" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in the (1) pppol2tp_sendmsg function in net/l2tp/l2tp_ppp.c, and the (2) l2tp_ip_sendmsg function in net/l2tp/l2tp_ip.c, in the PPPoL2TP and IPoL2TP implementations in the Linux kernel before 2.6.36.2 allow local users to cause a denial of service (heap memory corruption and panic) or possibly gain privileges via a crafted sendto call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: L2TP send buffer allocation size overflows", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and 5 did not\ninclude L2TP functionality, and therefore are not affected by this\nissue. This has been addressed in Red Hat Enterprise Linux 6 and Red Hat\nEnterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0007.html and https://rhn.redhat.com/errata/RHSA-2011-0330.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4160" }, { "category": "external", "summary": "RHBZ#651892", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=651892" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4160", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4160" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4160", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4160" } ], "release_date": "2010-11-01T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-10T20:01:00+00:00", "details": "Users should upgrade to these updated kernel-rt packages. They are\nbased on upstream version 2.6.33.7.2-rt30 (despite package naming) and\ncorrect these issues. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0330" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: L2TP send buffer allocation size overflows" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4162", "cwe": { "id": "CWE-190", "name": "Integer Overflow or Wraparound" }, "discovery_date": "2010-11-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "652529" } ], "notes": [ { "category": "description", "text": "Multiple integer overflows in fs/bio.c in the Linux kernel before 2.6.36.2 allow local users to cause a denial of service (system crash) via a crafted device ioctl to a SCSI device.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: bio: integer overflow page count when mapping/copying user data", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 4 and 5 as they did not backport the upstream commit c5dec1c3 that introduced the issue. This has been addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0007.html and https://rhn.redhat.com/errata/RHSA-2011-0330.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4162" }, { "category": "external", "summary": "RHBZ#652529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=652529" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4162", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4162" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4162", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4162" } ], "release_date": "2010-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-10T20:01:00+00:00", "details": "Users should upgrade to these updated kernel-rt packages. They are\nbased on upstream version 2.6.33.7.2-rt30 (despite package naming) and\ncorrect these issues. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0330" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: bio: integer overflow page count when mapping/copying user data" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4163", "discovery_date": "2010-11-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "652957" } ], "notes": [ { "category": "description", "text": "The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 2.6.36.2 allows local users to cause a denial of service (panic) via a zero-length I/O request in a device ioctl to a SCSI device.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: panic when submitting certain 0-length I/O requests", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 4 and 5 as they did not backport the upstream commit c5dec1c3\nthat introduced the issue. This has been addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0007.html and https://rhn.redhat.com/errata/RHSA-2011-0330.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4163" }, { "category": "external", "summary": "RHBZ#652957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=652957" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4163", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4163" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4163", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4163" } ], "release_date": "2010-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-10T20:01:00+00:00", "details": "Users should upgrade to these updated kernel-rt packages. They are\nbased on upstream version 2.6.33.7.2-rt30 (despite package naming) and\ncorrect these issues. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0330" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: panic when submitting certain 0-length I/O requests" }, { "acknowledgments": [ { "names": [ "Steve Chen" ] } ], "cve": "CVE-2010-4165", "discovery_date": "2010-11-12T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "652508" } ], "notes": [ { "category": "description", "text": "The do_tcp_setsockopt function in net/ipv4/tcp.c in the Linux kernel before 2.6.37-rc2 does not properly restrict TCP_MAXSEG (aka MSS) values, which allows local users to cause a denial of service (OOPS) via a setsockopt call that specifies a small value, leading to a divide-by-zero error or incorrect use of a signed integer.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: possible kernel oops from user MSS", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 4 and 5 as they did not backport the upstream commit that introduced the issue. This has been addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0283.html and https://rhn.redhat.com/errata/RHSA-2011-0330.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4165" }, { "category": "external", "summary": "RHBZ#652508", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=652508" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4165", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4165" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4165", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4165" } ], "release_date": "2010-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-10T20:01:00+00:00", "details": "Users should upgrade to these updated kernel-rt packages. They are\nbased on upstream version 2.6.33.7.2-rt30 (despite package naming) and\ncorrect these issues. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0330" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: possible kernel oops from user MSS" }, { "acknowledgments": [ { "names": [ "Alan Cox" ] } ], "cve": "CVE-2010-4242", "discovery_date": "2010-10-08T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "641410" } ], "notes": [ { "category": "description", "text": "The hci_uart_tty_open function in the HCI UART driver (drivers/bluetooth/hci_ldisc.c) in the Linux kernel 2.6.36, and possibly other versions, does not verify whether the tty has a write operation, which allows local users to cause a denial of service (NULL pointer dereference) via vectors related to the Bluetooth driver.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: missing tty ops write function presence check in hci_uart_tty_open()", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4242" }, { "category": "external", "summary": "RHBZ#641410", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=641410" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4242", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4242" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4242", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4242" } ], "release_date": "2010-10-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-10T20:01:00+00:00", "details": "Users should upgrade to these updated kernel-rt packages. They are\nbased on upstream version 2.6.33.7.2-rt30 (despite package naming) and\ncorrect these issues. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0330" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: missing tty ops write function presence check in hci_uart_tty_open()" }, { "cve": "CVE-2010-4248", "discovery_date": "2010-11-23T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "656264" } ], "notes": [ { "category": "description", "text": "Race condition in the __exit_signal function in kernel/exit.c in the Linux kernel before 2.6.37-rc2 allows local users to cause a denial of service via vectors related to multithreaded exec, the use of a thread group leader in kernel/posix-cpu-timers.c, and the selection of a new thread group leader in the de_thread function in fs/exec.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: posix-cpu-timers: workaround to suppress the problems with mt exec", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not have support for CPU time clocks for the POSIX clock interface. This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0004.html, https://rhn.redhat.com/errata/RHSA-2011-0007.html and https://rhn.redhat.com/errata/RHSA-2011-0330.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4248" }, { "category": "external", "summary": "RHBZ#656264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656264" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4248", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4248" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4248", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4248" } ], "release_date": "2010-11-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-10T20:01:00+00:00", "details": "Users should upgrade to these updated kernel-rt packages. They are\nbased on upstream version 2.6.33.7.2-rt30 (despite package naming) and\ncorrect these issues. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0330" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: posix-cpu-timers: workaround to suppress the problems with mt exec" }, { "acknowledgments": [ { "names": [ "Vegard Nossum" ] } ], "cve": "CVE-2010-4249", "discovery_date": "2010-11-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "656756" } ], "notes": [ { "category": "description", "text": "The wait_for_unix_gc function in net/unix/garbage.c in the Linux kernel before 2.6.37-rc3-next-20101125 does not properly select times for garbage collection of inflight sockets, which allows local users to cause a denial of service (system hang) via crafted use of the socketpair and sendmsg system calls for SOCK_SEQPACKET sockets.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: unix socket local dos", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4249" }, { "category": "external", "summary": "RHBZ#656756", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656756" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4249", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4249" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4249", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4249" } ], "release_date": "2010-11-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-10T20:01:00+00:00", "details": "Users should upgrade to these updated kernel-rt packages. They are\nbased on upstream version 2.6.33.7.2-rt30 (despite package naming) and\ncorrect these issues. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0330" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: unix socket local dos" }, { "acknowledgments": [ { "names": [ "Vegard Nossum" ] } ], "cve": "CVE-2010-4250", "cwe": { "id": "CWE-401", "name": "Missing Release of Memory after Effective Lifetime" }, "discovery_date": "2010-11-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "656830" } ], "notes": [ { "category": "description", "text": "Memory leak in the inotify_init1 function in fs/notify/inotify/inotify_user.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory consumption) via vectors involving failed attempts to create files.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: inotify memory leak", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat Enterprise Linux 4 and 5. It was addressed in Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0330.html. A future kernel update in Red Hat Enterprise Linux 6 may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4250" }, { "category": "external", "summary": "RHBZ#656830", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656830" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4250", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4250" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4250", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4250" } ], "release_date": "2010-11-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-10T20:01:00+00:00", "details": "Users should upgrade to these updated kernel-rt packages. They are\nbased on upstream version 2.6.33.7.2-rt30 (despite package naming) and\ncorrect these issues. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0330" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: inotify memory leak" }, { "acknowledgments": [ { "names": [ "Tavis Ormandy" ] } ], "cve": "CVE-2010-4346", "discovery_date": "2010-12-09T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "662189" } ], "notes": [ { "category": "description", "text": "The install_special_mapping function in mm/mmap.c in the Linux kernel before 2.6.37-rc6 does not make an expected security_file_mmap function call, which allows local users to bypass intended mmap_min_addr restrictions and possibly conduct NULL pointer dereference attacks via a crafted assembly-language application.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: install_special_mapping skips security_file_mmap check", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 4 is not vulnerable because it checks for mmap_min_addr even in special cases.\n\nThe Linux kernel as shipped with Red Hat Enterprise Linux 5, 6, and Red Hat Enterprise MRG have mmap_min_addr sysctl tunable set to 4096, and therefore are not affected by this issue. However, as a preventive measure (for example, for administrators who have increased mmap_min_addr), we have addressed this in Red Hat Enterprise Linux 5, 6 and MRG via https://rhn.redhat.com/errata/RHSA-2011-0429.html, https://rhn.redhat.com/errata/RHSA-2011-0421.html, and https://rhn.redhat.com/errata/RHSA-2011-0330.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4346" }, { "category": "external", "summary": "RHBZ#662189", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=662189" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4346", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4346" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4346", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4346" } ], "release_date": "2010-12-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-10T20:01:00+00:00", "details": "Users should upgrade to these updated kernel-rt packages. They are\nbased on upstream version 2.6.33.7.2-rt30 (despite package naming) and\ncorrect these issues. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0330" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: install_special_mapping skips security_file_mmap check" }, { "cve": "CVE-2010-4347", "discovery_date": "2010-12-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "663542" } ], "notes": [ { "category": "description", "text": "The ACPI subsystem in the Linux kernel before 2.6.36.2 uses 0222 permissions for the debugfs custom_method file, which allows local users to gain privileges by placing a custom ACPI method in the ACPI interpreter tables, related to the acpi_debugfs_init function in drivers/acpi/debugfs.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: local privilege escalation via /sys/kernel/debug/acpi/custom_method", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 4, 5, and 6 as they did not include upstream commit a1a541d8 and a25ee920 that introduced the problem. This has been addressed in Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0330.html.\n\nNotes:\n\nThis requires debugfs to be mounted on a local system in order to have access to the custom_method file. Debugfs is not mounted by default. You need to run \"mount -t debugfs nodev /sys/kernel/debug\" as root first.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4347" }, { "category": "external", "summary": "RHBZ#663542", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=663542" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4347", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4347" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4347", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4347" } ], "release_date": "2010-11-13T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-10T20:01:00+00:00", "details": "Users should upgrade to these updated kernel-rt packages. They are\nbased on upstream version 2.6.33.7.2-rt30 (despite package naming) and\ncorrect these issues. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0330" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: local privilege escalation via /sys/kernel/debug/acpi/custom_method" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4565", "discovery_date": "2010-11-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "664544" } ], "notes": [ { "category": "description", "text": "The bcm_connect function in net/can/bcm.c (aka the Broadcast Manager) in the Controller Area Network (CAN) implementation in the Linux kernel 2.6.36 and earlier creates a publicly accessible file with a filename containing a kernel memory address, which allows local users to obtain potentially sensitive information about kernel memory use by listing this filename.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: CAN info leak", "title": "Vulnerability summary" }, { "category": "other", "text": "The Linux kernel as shipped with Red Hat Enterprise Linux 3, 4 and 5 did not\ninclude CAN bus subsystem support, and therefore are not affected by this\nissue. This has been addressed in Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0330.html. A future kernel update in Red Hat Enterprise Linux 6 may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4565" }, { "category": "external", "summary": "RHBZ#664544", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=664544" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4565", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4565" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4565", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4565" } ], "release_date": "2010-11-02T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-10T20:01:00+00:00", "details": "Users should upgrade to these updated kernel-rt packages. They are\nbased on upstream version 2.6.33.7.2-rt30 (despite package naming) and\ncorrect these issues. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0330" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: CAN info leak" }, { "cve": "CVE-2010-4648", "discovery_date": "2011-01-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "667907" } ], "notes": [ { "category": "description", "text": "The orinoco_ioctl_set_auth function in drivers/net/wireless/orinoco/wext.c in the Linux kernel before 2.6.37 does not properly implement a TKIP protection mechanism, which makes it easier for remote attackers to obtain access to a Wi-Fi network by reading Wi-Fi frames.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: orinoco: fix TKIP countermeasure behaviour", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of Linux kernel as shipped with Red Hat\nEnterprise Linux 4 and 5 as they did not backport the upstream commit d03032af that introduced this issue. Future kernel updates in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4648" }, { "category": "external", "summary": "RHBZ#667907", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=667907" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4648", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4648" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4648", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4648" } ], "release_date": "2010-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-10T20:01:00+00:00", "details": "Users should upgrade to these updated kernel-rt packages. They are\nbased on upstream version 2.6.33.7.2-rt30 (despite package naming) and\ncorrect these issues. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0330" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: orinoco: fix TKIP countermeasure behaviour" }, { "cve": "CVE-2010-4649", "discovery_date": "2011-01-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "667916" } ], "notes": [ { "category": "description", "text": "Integer overflow in the ib_uverbs_poll_cq function in drivers/infiniband/core/uverbs_cmd.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a large value of a certain structure member.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: IB/uverbs: Handle large number of entries in poll CQ", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4649" }, { "category": "external", "summary": "RHBZ#667916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=667916" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4649", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4649" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4649", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4649" } ], "release_date": "2010-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-10T20:01:00+00:00", "details": "Users should upgrade to these updated kernel-rt packages. They are\nbased on upstream version 2.6.33.7.2-rt30 (despite package naming) and\ncorrect these issues. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0330" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: IB/uverbs: Handle large number of entries in poll CQ" }, { "acknowledgments": [ { "names": [ "Kees Cook" ] } ], "cve": "CVE-2010-4655", "discovery_date": "2011-01-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "672428" } ], "notes": [ { "category": "description", "text": "net/core/ethtool.c in the Linux kernel before 2.6.36 does not initialize certain data structures, which allows local users to obtain potentially sensitive information from kernel heap memory by leveraging the CAP_NET_ADMIN capability for an ethtool ioctl call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: heap contents leak for CAP_NET_ADMIN via ethtool ioctl", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4655" }, { "category": "external", "summary": "RHBZ#672428", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672428" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4655", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4655" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4655", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4655" } ], "release_date": "2010-10-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-10T20:01:00+00:00", "details": "Users should upgrade to these updated kernel-rt packages. They are\nbased on upstream version 2.6.33.7.2-rt30 (despite package naming) and\ncorrect these issues. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0330" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 1.2, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:H/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: heap contents leak for CAP_NET_ADMIN via ethtool ioctl" }, { "acknowledgments": [ { "names": [ "Kees Cook" ] } ], "cve": "CVE-2010-4656", "discovery_date": "2011-01-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "672420" } ], "notes": [ { "category": "description", "text": "The iowarrior_write function in drivers/usb/misc/iowarrior.c in the Linux kernel before 2.6.37 does not properly allocate memory, which might allow local users to trigger a heap-based buffer overflow, and consequently cause a denial of service or gain privileges, via a long report.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: iowarrior usb device heap overflow", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 4 and 5 as they do not have support for the I/O-Warrior USB devices. This has been addressed in Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0330.html. A future kernel update in Red Hat Enterprise Linux 6 may address this flaw.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4656" }, { "category": "external", "summary": "RHBZ#672420", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672420" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4656", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4656" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4656", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4656" } ], "release_date": "2010-10-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-10T20:01:00+00:00", "details": "Users should upgrade to these updated kernel-rt packages. They are\nbased on upstream version 2.6.33.7.2-rt30 (despite package naming) and\ncorrect these issues. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0330" } ], "scores": [ { "cvss_v2": { "accessComplexity": "HIGH", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:H/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: iowarrior usb device heap overflow" }, { "acknowledgments": [ { "names": [ "Dan Rosenberg" ] } ], "cve": "CVE-2010-4668", "discovery_date": "2010-11-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "652957" } ], "notes": [ { "category": "description", "text": "The blk_rq_map_user_iov function in block/blk-map.c in the Linux kernel before 2.6.37-rc7 allows local users to cause a denial of service (panic) via a zero-length I/O request in a device ioctl to a SCSI device, related to an unaligned map. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-4163.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: panic when submitting certain 0-length I/O requests", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 4 and 5 as they did not backport the upstream commit c5dec1c3\nthat introduced the issue. This has been addressed in Red Hat Enterprise Linux 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-0007.html and https://rhn.redhat.com/errata/RHSA-2011-0330.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2010-4668" }, { "category": "external", "summary": "RHBZ#652957", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=652957" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2010-4668", "url": "https://www.cve.org/CVERecord?id=CVE-2010-4668" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2010-4668", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4668" } ], "release_date": "2010-11-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-10T20:01:00+00:00", "details": "Users should upgrade to these updated kernel-rt packages. They are\nbased on upstream version 2.6.33.7.2-rt30 (despite package naming) and\ncorrect these issues. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0330" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:M/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: panic when submitting certain 0-length I/O requests" }, { "cve": "CVE-2011-0521", "discovery_date": "2011-01-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "672398" } ], "notes": [ { "category": "description", "text": "The dvb_ca_ioctl function in drivers/media/dvb/ttpci/av7110_ca.c in the Linux kernel before 2.6.38-rc2 does not check the sign of a certain integer field, which allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact via a negative value.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: av7110 negative array offset", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the version of the Linux kernel as shipped with Red Hat Enterprise Linux 3 as it did not include support for ULE (Unidirectional Lightweight Encapsulation). We have included a fix for this issue in Red Hat Enterprise Linux 4, 5 and Red Hat Enterprise MRG however the affected module is not build by default.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-0521" }, { "category": "external", "summary": "RHBZ#672398", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=672398" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-0521", "url": "https://www.cve.org/CVERecord?id=CVE-2011-0521" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-0521", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-0521" } ], "release_date": "2011-01-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-10T20:01:00+00:00", "details": "Users should upgrade to these updated kernel-rt packages. They are\nbased on upstream version 2.6.33.7.2-rt30 (despite package naming) and\ncorrect these issues. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0330" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: av7110 negative array offset" }, { "cve": "CVE-2011-1044", "discovery_date": "2011-01-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "667916" } ], "notes": [ { "category": "description", "text": "The ib_uverbs_poll_cq function in drivers/infiniband/core/uverbs_cmd.c in the Linux kernel before 2.6.37 does not initialize a certain response buffer, which allows local users to obtain potentially sensitive information from kernel memory via vectors that cause this buffer to be only partially filled, a different vulnerability than CVE-2010-4649.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: IB/uverbs: Handle large number of entries in poll CQ", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-1044" }, { "category": "external", "summary": "RHBZ#667916", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=667916" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-1044", "url": "https://www.cve.org/CVERecord?id=CVE-2011-1044" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1044", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1044" } ], "release_date": "2010-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-03-10T20:01:00+00:00", "details": "Users should upgrade to these updated kernel-rt packages. They are\nbased on upstream version 2.6.33.7.2-rt30 (despite package naming) and\ncorrect these issues. The system must be rebooted for this update to\ntake effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2011:0330" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.src", "5Server-MRG-Realtime-1.0:kernel-rt-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debug-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-debuginfo-common-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-doc-0:2.6.33.7-rt29.55.el5rt.noarch", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-trace-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:kernel-rt-vanilla-devel-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-0:2.6.33.7-rt29.55.el5rt.x86_64", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.i686", "5Server-MRG-Realtime-1.0:perf-debuginfo-0:2.6.33.7-rt29.55.el5rt.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: IB/uverbs: Handle large number of entries in poll CQ" } ] }
gsd-2010-4250
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
Memory leak in the inotify_init1 function in fs/notify/inotify/inotify_user.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory consumption) via vectors involving failed attempts to create files.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2010-4250", "description": "Memory leak in the inotify_init1 function in fs/notify/inotify/inotify_user.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory consumption) via vectors involving failed attempts to create files.", "id": "GSD-2010-4250", "references": [ "https://www.suse.com/security/cve/CVE-2010-4250.html", "https://access.redhat.com/errata/RHSA-2011:0498", "https://access.redhat.com/errata/RHSA-2011:0330", "https://linux.oracle.com/cve/CVE-2010-4250.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2010-4250" ], "details": "Memory leak in the inotify_init1 function in fs/notify/inotify/inotify_user.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory consumption) via vectors involving failed attempts to create files.", "id": "GSD-2010-4250", "modified": "2023-12-13T01:21:30.031613Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-4250", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Memory leak in the inotify_init1 function in fs/notify/inotify/inotify_user.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory consumption) via vectors involving failed attempts to create files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37", "refsource": "MISC", "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2ae4cc9a16e211c8a128ba10d22a85431f093ab", "refsource": "MISC", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2ae4cc9a16e211c8a128ba10d22a85431f093ab" }, { "name": "http://www.openwall.com/lists/oss-security/2010/11/24/11", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2010/11/24/11" }, { "name": "https://github.com/torvalds/linux/commit/a2ae4cc9a16e211c8a128ba10d22a85431f093ab", "refsource": "MISC", "url": "https://github.com/torvalds/linux/commit/a2ae4cc9a16e211c8a128ba10d22a85431f093ab" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=656830", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656830" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.6.36.4", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.36.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2010-4250" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Memory leak in the inotify_init1 function in fs/notify/inotify/inotify_user.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory consumption) via vectors involving failed attempts to create files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37", "refsource": "CONFIRM", "tags": [], "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=656830", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656830" }, { "name": "[oss-security] 20101124 Re: CVE request: kernel: inotify memory leak", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2010/11/24/11" }, { "name": "https://github.com/torvalds/linux/commit/a2ae4cc9a16e211c8a128ba10d22a85431f093ab", "refsource": "CONFIRM", "tags": [ "Patch" ], "url": "https://github.com/torvalds/linux/commit/a2ae4cc9a16e211c8a128ba10d22a85431f093ab" }, { "name": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2ae4cc9a16e211c8a128ba10d22a85431f093ab", "refsource": "MISC", "tags": [], "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2ae4cc9a16e211c8a128ba10d22a85431f093ab" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T04:28Z", "publishedDate": "2012-06-21T23:55Z" } } }
ghsa-62vr-m7vf-79xv
Vulnerability from github
Published
2022-05-17 05:28
Modified
2022-05-17 05:28
Details
Memory leak in the inotify_init1 function in fs/notify/inotify/inotify_user.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory consumption) via vectors involving failed attempts to create files.
{ "affected": [], "aliases": [ "CVE-2010-4250" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2012-06-21T23:55:00Z", "severity": "MODERATE" }, "details": "Memory leak in the inotify_init1 function in fs/notify/inotify/inotify_user.c in the Linux kernel before 2.6.37 allows local users to cause a denial of service (memory consumption) via vectors involving failed attempts to create files.", "id": "GHSA-62vr-m7vf-79xv", "modified": "2022-05-17T05:28:05Z", "published": "2022-05-17T05:28:05Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2010-4250" }, { "type": "WEB", "url": "https://github.com/torvalds/linux/commit/a2ae4cc9a16e211c8a128ba10d22a85431f093ab" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2011:0330" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2011:0498" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2010-4250" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=656830" }, { "type": "WEB", "url": "http://ftp.osuosl.org/pub/linux/kernel/v2.6/ChangeLog-2.6.37" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2ae4cc9a16e211c8a128ba10d22a85431f093ab" }, { "type": "WEB", "url": "http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commit;h=a2ae4cc9a16e211c8a128ba10d22a85431f093ab" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2010/11/24/11" } ], "schema_version": "1.4.0", "severity": [] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.