Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-2901
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T23:15:31.518Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "55082", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/55082" }, { "name": "[oss-security] 20110902 Xen Security Advisory 4 (CVE-2011-2901) - Xen 3.3 vaddr validation", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/02/2" }, { "name": "GLSA-201309-24", "tags": [ "vendor-advisory", "x_refsource_GENTOO", "x_transferred" ], "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" }, { "name": "RHSA-2011:1212", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2011-1212.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=728042" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2011-09-02T00:00:00", "descriptions": [ { "lang": "en", "value": "Off-by-one error in the __addr_ok macro in Xen 3.3 and earlier allows local 64 bit PV guest administrators to cause a denial of service (host crash) via unspecified hypercalls that ignore virtual-address bits." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-12-27T00:57:03", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "name": "55082", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/55082" }, { "name": "[oss-security] 20110902 Xen Security Advisory 4 (CVE-2011-2901) - Xen 3.3 vaddr validation", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2011/09/02/2" }, { "name": "GLSA-201309-24", "tags": [ "vendor-advisory", "x_refsource_GENTOO" ], "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" }, { "name": "RHSA-2011:1212", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://rhn.redhat.com/errata/RHSA-2011-1212.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=728042" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2011-2901", "datePublished": "2013-10-01T17:00:00", "dateReserved": "2011-07-27T00:00:00", "dateUpdated": "2024-08-06T23:15:31.518Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2011-2901\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2013-10-01T17:55:02.960\",\"lastModified\":\"2024-11-21T01:29:14.157\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Off-by-one error in the __addr_ok macro in Xen 3.3 and earlier allows local 64 bit PV guest administrators to cause a denial of service (host crash) via unspecified hypercalls that ignore virtual-address bits.\"},{\"lang\":\"es\",\"value\":\"Error de superaci\u00f3n de l\u00edmite (off-by-one) en la macro __addr_ok en Xen 3.3 y anteriores permite a administradores invitados locales 64 bit PV causar una denegaci\u00f3n del servicio (ca\u00edda del host) a trav\u00e9s de hypercalls no especificadas que ignoran bits de direcciones virtuales.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:S/C:N/I:N/A:C\",\"baseScore\":5.5,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":5.1,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.3.0\",\"matchCriteriaId\":\"8B5A282B-8C44-49E9-8BCE-C6DC96C53C37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5D62197-4FF7-4B73-8DC6-6E9344AF7CAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44CAE6A7-9817-472C-B1C6-3FF196304D08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E96BB7DE-0A6A-4418-A879-159F5FF88615\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7568820A-ED66-47DF-A9B0-27A474D6C2C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D8C046D-BE62-43BA-9F50-B4D383475EA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B81B6EEB-D01E-432D-AEBF-707409741C0A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A4B60DE-A8C0-459E-A99C-6EF0D3264B75\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A83F4F7E-53CF-4066-857B-2154D25979D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"048E790E-B0A1-4504-9299-0B6D9CB0C509\"}]}]}],\"references\":[{\"url\":\"http://rhn.redhat.com/errata/RHSA-2011-1212.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/55082\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201309-24.xml\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2011/09/02/2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=728042\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2011-1212.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/55082\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://security.gentoo.org/glsa/glsa-201309-24.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.openwall.com/lists/oss-security/2011/09/02/2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=728042\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
gsd-2011-2901
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2011-2901", "description": "Off-by-one error in the __addr_ok macro in Xen 3.3 and earlier allows local 64 bit PV guest administrators to cause a denial of service (host crash) via unspecified hypercalls that ignore virtual-address bits.", "id": "GSD-2011-2901", "references": [ "https://www.suse.com/security/cve/CVE-2011-2901.html", "https://access.redhat.com/errata/RHSA-2011:1813", "https://access.redhat.com/errata/RHSA-2011:1212", "https://linux.oracle.com/cve/CVE-2011-2901.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2011-2901" ], "details": "Off-by-one error in the __addr_ok macro in Xen 3.3 and earlier allows local 64 bit PV guest administrators to cause a denial of service (host crash) via unspecified hypercalls that ignore virtual-address bits.", "id": "GSD-2011-2901", "modified": "2023-12-13T01:19:06.535363Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-2901", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_affected": "=", "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Off-by-one error in the __addr_ok macro in Xen 3.3 and earlier allows local 64 bit PV guest administrators to cause a denial of service (host crash) via unspecified hypercalls that ignore virtual-address bits." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://rhn.redhat.com/errata/RHSA-2011-1212.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2011-1212.html" }, { "name": "http://secunia.com/advisories/55082", "refsource": "MISC", "url": "http://secunia.com/advisories/55082" }, { "name": "http://security.gentoo.org/glsa/glsa-201309-24.xml", "refsource": "MISC", "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" }, { "name": "http://www.openwall.com/lists/oss-security/2011/09/02/2", "refsource": "MISC", "url": "http://www.openwall.com/lists/oss-security/2011/09/02/2" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=728042", "refsource": "MISC", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=728042" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:xen:xen:3.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:3.2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:3.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.3.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:3.2.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:3.0.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:3.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:3.0.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:3.1.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:xen:xen:3.1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2011-2901" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Off-by-one error in the __addr_ok macro in Xen 3.3 and earlier allows local 64 bit PV guest administrators to cause a denial of service (host crash) via unspecified hypercalls that ignore virtual-address bits." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "[oss-security] 20110902 Xen Security Advisory 4 (CVE-2011-2901) - Xen 3.3 vaddr validation", "refsource": "MLIST", "tags": [], "url": "http://www.openwall.com/lists/oss-security/2011/09/02/2" }, { "name": "https://bugzilla.redhat.com/show_bug.cgi?id=728042", "refsource": "CONFIRM", "tags": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=728042" }, { "name": "55082", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/55082" }, { "name": "GLSA-201309-24", "refsource": "GENTOO", "tags": [], "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" }, { "name": "RHSA-2011:1212", "refsource": "REDHAT", "tags": [], "url": "http://rhn.redhat.com/errata/RHSA-2011-1212.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 5.1, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2023-02-13T04:31Z", "publishedDate": "2013-10-01T17:55Z" } } }
rhsa-2011_1813
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues and various bugs\nare now available for Red Hat Enterprise Linux 5.6 Extended Update Support.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "These packages contain the Linux kernel.\n\nThis update fixes the following security issues:\n\n* A flaw in the Stream Control Transmission Protocol (SCTP) implementation\ncould allow a remote attacker to cause a denial of service by sending a\nspecially-crafted SCTP packet to a target system. (CVE-2011-2482,\nImportant)\n\nIf you do not run applications that use SCTP, you can prevent the sctp\nmodule from being loaded by adding the following to the end of the\n\"/etc/modprobe.d/blacklist.conf\" file:\n\nblacklist sctp\n\nThis way, the sctp module cannot be loaded accidentally, which may occur\nif an application that requires SCTP is started. A reboot is not necessary\nfor this change to take effect.\n\n* A flaw in the client-side NFS Lock Manager (NLM) implementation could\nallow a local, unprivileged user to cause a denial of service.\n(CVE-2011-2491, Important)\n\n* Flaws in the netlink-based wireless configuration interface could allow\na local user, who has the CAP_NET_ADMIN capability, to cause a denial of\nservice or escalate their privileges on systems that have an active\nwireless interface. (CVE-2011-2517, Important)\n\n* A flaw was found in the way the Linux kernel\u0027s Xen hypervisor\nimplementation emulated the SAHF instruction. When using a\nfully-virtualized guest on a host that does not use hardware assisted\npaging (HAP), such as those running CPUs that do not have support for (or\nthose that have it disabled) Intel Extended Page Tables (EPT) or AMD\nVirtualization (AMD-V) Rapid Virtualization Indexing (RVI), a privileged\nguest user could trigger this flaw to cause the hypervisor to crash.\n(CVE-2011-2519, Moderate)\n\n* A flaw in the __addr_ok() macro in the Linux kernel\u0027s Xen hypervisor\nimplementation when running on 64-bit systems could allow a privileged\nguest user to crash the hypervisor. (CVE-2011-2901, Moderate)\n\n* /proc/[PID]/io is world-readable by default. Previously, these files\ncould be read without any further restrictions. A local, unprivileged user\ncould read these files, belonging to other, possibly privileged processes\nto gather confidential information, such as the length of a password used\nin a process. (CVE-2011-2495, Low)\n\nRed Hat would like to thank Vasily Averin for reporting CVE-2011-2491, and\nVasiliy Kulikov of Openwall for reporting CVE-2011-2495.\n\nThis update also fixes the following bugs:\n\n* On Broadcom PCI cards that use the tg3 driver, the operational state of a\nnetwork device, represented by the value in\n\"/sys/class/net/ethX/operstate\", was not initialized by default.\nConsequently, the state was reported as \"unknown\" when the tg3 network\ndevice was actually in the \"up\" state. This update modifies the tg3 driver\nto properly set the operstate value. (BZ#744699)\n\n* A KVM (Kernel-based Virtual Machine) guest can get preempted by the host,\nwhen a higher priority process needs to run. When a guest is not running\nfor several timer interrupts in a row, ticks could be lost, resulting in\nthe jiffies timer advancing slower than expected and timeouts taking longer\nthan expected. To correct for the issue of lost ticks,\ndo_timer_tsc_timekeeping() checks a reference clock source (kvm-clock when\nrunning as a KVM guest) to see if timer interrupts have been missed. If so,\njiffies is incremented by the number of missed timer interrupts, ensuring\nthat programs are woken up on time. (BZ#747874)\n\n* When a block device object was allocated, the bd_super field was not\nbeing explicitly initialized to NULL. Previously, users of the block device\nobject could set bd_super to NULL when the object was released by calling\nthe kill_block_super() function. Certain third-party file systems do not\nalways use this function, and bd_super could therefore become uninitialized\nwhen the object was allocated again. This could cause a kernel panic in the\nblkdev_releasepage() function, when the uninitialized bd_super field was\ndereferenced. Now, bd_super is properly initialized in the bdget()\nfunction, and the kernel panic no longer occurs. (BZ#751137)", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:1813", "url": "https://access.redhat.com/errata/RHSA-2011:1813" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "709393", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709393" }, { "category": "external", "summary": "714867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=714867" }, { "category": "external", "summary": "716825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=716825" }, { "category": "external", "summary": "718152", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=718152" }, { "category": "external", "summary": "718882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=718882" }, { "category": "external", "summary": "728042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=728042" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1813.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T04:34:34+00:00", "generator": { "date": "2024-11-22T04:34:34+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:1813", "initial_release_date": "2011-12-13T21:27:00+00:00", "revision_history": [ { "date": "2011-12-13T21:27:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-12-13T21:28:38+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:34:34+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux EUS (v. 5.6 server)", "product": { "name": "Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS", "product_identification_helper": { "cpe": "cpe:/o:redhat:rhel_eus:5.6" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:2.6.18-238.31.1.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-238.31.1.el5.i686", "product_id": "kernel-debug-0:2.6.18-238.31.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.31.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.31.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-238.31.1.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-238.31.1.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-238.31.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-238.31.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-238.31.1.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-238.31.1.el5.i686", "product_id": "kernel-xen-0:2.6.18-238.31.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-238.31.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-238.31.1.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-238.31.1.el5.i686", "product_id": "kernel-PAE-0:2.6.18-238.31.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-238.31.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-238.31.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-238.31.1.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-238.31.1.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-238.31.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.31.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-238.31.1.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-238.31.1.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-238.31.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.31.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-238.31.1.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-238.31.1.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-238.31.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.31.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-238.31.1.el5.i686", "product": { "name": "kernel-0:2.6.18-238.31.1.el5.i686", "product_id": "kernel-0:2.6.18-238.31.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-238.31.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-238.31.1.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-238.31.1.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-238.31.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-238.31.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-238.31.1.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-238.31.1.el5.i686", "product_id": "kernel-devel-0:2.6.18-238.31.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.31.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-238.31.1.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-238.31.1.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-238.31.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-238.31.1.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-238.31.1.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-238.31.1.el5.i386", "product_id": "kernel-headers-0:2.6.18-238.31.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.31.1.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:2.6.18-238.31.1.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-238.31.1.el5.ia64", "product_id": "kernel-debug-0:2.6.18-238.31.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.31.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.31.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-238.31.1.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-238.31.1.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-238.31.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-238.31.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-238.31.1.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-238.31.1.el5.ia64", "product_id": "kernel-xen-0:2.6.18-238.31.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-238.31.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-238.31.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-238.31.1.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-238.31.1.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-238.31.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.31.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-238.31.1.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-238.31.1.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-238.31.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.31.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.31.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-238.31.1.el5.ia64", "product": { "name": "kernel-0:2.6.18-238.31.1.el5.ia64", "product_id": "kernel-0:2.6.18-238.31.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-238.31.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-238.31.1.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-238.31.1.el5.ia64", "product_id": "kernel-devel-0:2.6.18-238.31.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.31.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-238.31.1.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-238.31.1.el5.ia64", "product_id": "kernel-headers-0:2.6.18-238.31.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.31.1.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:2.6.18-238.31.1.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-238.31.1.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-238.31.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.31.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.31.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-238.31.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-238.31.1.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-238.31.1.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-238.31.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-238.31.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.31.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-238.31.1.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-238.31.1.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-238.31.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.31.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.31.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-238.31.1.el5.ppc64", "product": { "name": "kernel-0:2.6.18-238.31.1.el5.ppc64", "product_id": "kernel-0:2.6.18-238.31.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-238.31.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-238.31.1.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-238.31.1.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-238.31.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-238.31.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-238.31.1.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-238.31.1.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-238.31.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.31.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-238.31.1.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-238.31.1.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-238.31.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.31.1.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-238.31.1.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-238.31.1.el5.ppc", "product_id": "kernel-headers-0:2.6.18-238.31.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.31.1.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:2.6.18-238.31.1.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-238.31.1.el5.s390x", "product_id": "kernel-debug-0:2.6.18-238.31.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.31.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.31.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-238.31.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-238.31.1.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-238.31.1.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-238.31.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-238.31.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-238.31.1.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-238.31.1.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-238.31.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.31.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-238.31.1.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-238.31.1.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-238.31.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.31.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-238.31.1.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-238.31.1.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-238.31.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.31.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-238.31.1.el5.s390x", "product": { "name": "kernel-0:2.6.18-238.31.1.el5.s390x", "product_id": "kernel-0:2.6.18-238.31.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-238.31.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-238.31.1.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-238.31.1.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-238.31.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-238.31.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-238.31.1.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-238.31.1.el5.s390x", "product_id": "kernel-devel-0:2.6.18-238.31.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.31.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-238.31.1.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-238.31.1.el5.s390x", "product_id": "kernel-headers-0:2.6.18-238.31.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.31.1.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-debug-0:2.6.18-238.31.1.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-238.31.1.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-238.31.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-238.31.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-238.31.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-238.31.1.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-238.31.1.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-238.31.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-238.31.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-238.31.1.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-238.31.1.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-238.31.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-238.31.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-238.31.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-238.31.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-238.31.1.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-238.31.1.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-238.31.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-238.31.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-238.31.1.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-238.31.1.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-238.31.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-238.31.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-238.31.1.el5.x86_64", "product": { "name": "kernel-0:2.6.18-238.31.1.el5.x86_64", "product_id": "kernel-0:2.6.18-238.31.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-238.31.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-238.31.1.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-238.31.1.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-238.31.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-238.31.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-238.31.1.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-238.31.1.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-238.31.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-238.31.1.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-238.31.1.el5.src", "product": { "name": "kernel-0:2.6.18-238.31.1.el5.src", "product_id": "kernel-0:2.6.18-238.31.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-238.31.1.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-238.31.1.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-238.31.1.el5.noarch", "product_id": "kernel-doc-0:2.6.18-238.31.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-238.31.1.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-238.31.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.i686" }, "product_reference": "kernel-0:2.6.18-238.31.1.el5.i686", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-238.31.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ia64" }, "product_reference": "kernel-0:2.6.18-238.31.1.el5.ia64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-238.31.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-238.31.1.el5.ppc64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-238.31.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.s390x" }, "product_reference": "kernel-0:2.6.18-238.31.1.el5.s390x", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-238.31.1.el5.src as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.src" }, "product_reference": "kernel-0:2.6.18-238.31.1.el5.src", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-238.31.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-238.31.1.el5.x86_64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-238.31.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-PAE-0:2.6.18-238.31.1.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-238.31.1.el5.i686", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-238.31.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-PAE-debuginfo-0:2.6.18-238.31.1.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-238.31.1.el5.i686", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-238.31.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-PAE-devel-0:2.6.18-238.31.1.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-238.31.1.el5.i686", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-238.31.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-238.31.1.el5.i686", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-238.31.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-238.31.1.el5.ia64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-238.31.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-238.31.1.el5.ppc64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-238.31.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-238.31.1.el5.s390x", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-238.31.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-238.31.1.el5.x86_64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.i686", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ia64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.s390x", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-238.31.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-238.31.1.el5.i686", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-238.31.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-238.31.1.el5.ia64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-238.31.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-238.31.1.el5.ppc64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-238.31.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-238.31.1.el5.s390x", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-238.31.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-238.31.1.el5.x86_64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-238.31.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-238.31.1.el5.i686", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-238.31.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-238.31.1.el5.ia64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-238.31.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-238.31.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-238.31.1.el5.s390x", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-238.31.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-238.31.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-238.31.1.el5.i686", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ia64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ppc64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-238.31.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-238.31.1.el5.s390x", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-238.31.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-238.31.1.el5.x86_64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-238.31.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-238.31.1.el5.i686", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-238.31.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-238.31.1.el5.ia64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-238.31.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-238.31.1.el5.ppc64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-238.31.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-238.31.1.el5.s390x", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-238.31.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-238.31.1.el5.x86_64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-238.31.1.el5.noarch as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-doc-0:2.6.18-238.31.1.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-238.31.1.el5.noarch", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-238.31.1.el5.i386 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-238.31.1.el5.i386", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-238.31.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-238.31.1.el5.ia64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-238.31.1.el5.ppc as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-238.31.1.el5.ppc", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-238.31.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-238.31.1.el5.ppc64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-238.31.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-238.31.1.el5.s390x", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-238.31.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-238.31.1.el5.x86_64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-238.31.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-238.31.1.el5.ppc64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-238.31.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-238.31.1.el5.s390x", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.s390x", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-238.31.1.el5.ppc64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-238.31.1.el5.ppc64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-238.31.1.el5.s390x as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-238.31.1.el5.s390x", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-238.31.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-238.31.1.el5.i686", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-238.31.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-238.31.1.el5.ia64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-238.31.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-238.31.1.el5.x86_64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.i686", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.ia64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-238.31.1.el5.i686 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-238.31.1.el5.i686", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-238.31.1.el5.ia64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-238.31.1.el5.ia64", "relates_to_product_reference": "5Server-5.6.EUS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-238.31.1.el5.x86_64 as a component of Red Hat Enterprise Linux EUS (v. 5.6 server)", "product_id": "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-238.31.1.el5.x86_64", "relates_to_product_reference": "5Server-5.6.EUS" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-2482", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2011-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "714867" } ], "notes": [ { "category": "description", "text": "A certain Red Hat patch to the sctp_sock_migrate function in net/sctp/socket.c in the Linux kernel before 2.6.21, as used in Red Hat Enterprise Linux (RHEL) 5, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted SCTP packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sctp dos", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not backport the upstream commit 3ab224be6d6. It did not affect the Linux kernels as shipped with Red Hat Enterprise Linux 6, and Red Hat Enterprise MRG as they have backported the upstream commit ea2bc483ff5 that Red Hat Enterprise Linux 5 did not. This has been addressed in Red Hat Enterprise Linux 5 via https://rhn.redhat.com/errata/RHSA-2011-1212.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.src", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-PAE-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-doc-0:2.6.18-238.31.1.el5.noarch", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.i386", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2482" }, { "category": "external", "summary": "RHBZ#714867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=714867" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2482", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2482" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2482", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2482" } ], "release_date": "2011-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-12-13T21:27:00+00:00", "details": "Users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. The system must be\nrebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.src", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-PAE-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-doc-0:2.6.18-238.31.1.el5.noarch", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.i386", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:1813" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.src", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-PAE-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-doc-0:2.6.18-238.31.1.el5.noarch", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.i386", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: sctp dos" }, { "acknowledgments": [ { "names": [ "Vasily Averin" ] } ], "cve": "CVE-2011-2491", "discovery_date": "2011-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "709393" } ], "notes": [ { "category": "description", "text": "The Network Lock Manager (NLM) protocol implementation in the NFS client functionality in the Linux kernel before 3.0 allows local users to cause a denial of service (system hang) via a LOCK_UN flock system call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: rpc task leak after flock()ing NFS share", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.src", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-PAE-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-doc-0:2.6.18-238.31.1.el5.noarch", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.i386", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2491" }, { "category": "external", "summary": "RHBZ#709393", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709393" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2491", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2491" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2491", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2491" } ], "release_date": "2011-05-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-12-13T21:27:00+00:00", "details": "Users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. The system must be\nrebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.src", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-PAE-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-doc-0:2.6.18-238.31.1.el5.noarch", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.i386", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:1813" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.src", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-PAE-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-doc-0:2.6.18-238.31.1.el5.noarch", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.i386", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: rpc task leak after flock()ing NFS share" }, { "acknowledgments": [ { "names": [ "Vasiliy Kulikov" ], "organization": "Openwall" } ], "cve": "CVE-2011-2495", "discovery_date": "2011-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "716825" } ], "notes": [ { "category": "description", "text": "fs/proc/base.c in the Linux kernel before 2.6.39.4 does not properly restrict access to /proc/#####/io files, which allows local users to obtain sensitive I/O statistics by polling a file, as demonstrated by discovering the length of another user\u0027s password.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: /proc/PID/io infoleak", "title": "Vulnerability summary" }, { "category": "other", "text": "This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-1212.html, https://rhn.redhat.com/errata/RHSA-2011-1189.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.src", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-PAE-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-doc-0:2.6.18-238.31.1.el5.noarch", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.i386", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2495" }, { "category": "external", "summary": "RHBZ#716825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=716825" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2495", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2495" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2495", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2495" } ], "release_date": "2011-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-12-13T21:27:00+00:00", "details": "Users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. The system must be\nrebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.src", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-PAE-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-doc-0:2.6.18-238.31.1.el5.noarch", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.i386", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:1813" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.src", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-PAE-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-doc-0:2.6.18-238.31.1.el5.noarch", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.i386", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: /proc/PID/io infoleak" }, { "cve": "CVE-2011-2517", "discovery_date": "2011-06-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "718152" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in net/wireless/nl80211.c in the Linux kernel before 2.6.39.2 allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability during scan operations with a long SSID value.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nl80211: missing check for valid SSID size in scan operations", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 4 as it did not provide support for the Linux wireless LAN (802.11) configuration API. This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-1212.html, https://rhn.redhat.com/errata/RHSA-2011-1189.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.src", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-PAE-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-doc-0:2.6.18-238.31.1.el5.noarch", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.i386", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2517" }, { "category": "external", "summary": "RHBZ#718152", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=718152" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2517", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2517" } ], "release_date": "2011-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-12-13T21:27:00+00:00", "details": "Users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. The system must be\nrebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.src", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-PAE-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-doc-0:2.6.18-238.31.1.el5.noarch", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.i386", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:1813" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.6, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.src", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-PAE-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-doc-0:2.6.18-238.31.1.el5.noarch", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.i386", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: nl80211: missing check for valid SSID size in scan operations" }, { "cve": "CVE-2011-2519", "discovery_date": "2011-07-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "718882" } ], "notes": [ { "category": "description", "text": "Xen in the Linux kernel, when running a guest on a host without hardware assisted paging (HAP), allows guest users to cause a denial of service (invalid pointer dereference and hypervisor crash) via the SAHF instruction.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xen: x86_emulate: fix SAHF emulation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects Red Hat Enterprise Linux 5. The versions of the Linux\nkernel-xen as shipped with Red Hat Enterprise Linux 4, 6, and Red Hat Enterprise MRG are not affected. This has been addressed in Red Hat Enterprise Linux 5 via https://rhn.redhat.com/errata/RHSA-2011-1212.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.src", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-PAE-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-doc-0:2.6.18-238.31.1.el5.noarch", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.i386", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2519" }, { "category": "external", "summary": "RHBZ#718882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=718882" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2519", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2519" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2519", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2519" } ], "release_date": "2011-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-12-13T21:27:00+00:00", "details": "Users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. The system must be\nrebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.src", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-PAE-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-doc-0:2.6.18-238.31.1.el5.noarch", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.i386", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:1813" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 5.2, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:S/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.src", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-PAE-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-doc-0:2.6.18-238.31.1.el5.noarch", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.i386", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: xen: x86_emulate: fix SAHF emulation" }, { "cve": "CVE-2011-2901", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2011-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "728042" } ], "notes": [ { "category": "description", "text": "Off-by-one error in the __addr_ok macro in Xen 3.3 and earlier allows local 64 bit PV guest administrators to cause a denial of service (host crash) via unspecified hypercalls that ignore virtual-address bits.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xen: off-by-one shift in x86_64 __addr_ok()", "title": "Vulnerability summary" }, { "category": "other", "text": "The versions of the Linux kernel as shipped with Red Hat Enterprise Linux 4, 6,\nand Red Hat Enterprise MRG are not affected. This has been addressed in Red Hat Enterprise Linux 5 via https://rhn.redhat.com/errata/RHSA-2011-1212.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.src", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-PAE-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-doc-0:2.6.18-238.31.1.el5.noarch", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.i386", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2901" }, { "category": "external", "summary": "RHBZ#728042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=728042" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2901", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2901" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2901", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2901" } ], "release_date": "2011-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-12-13T21:27:00+00:00", "details": "Users should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. The system must be\nrebooted for this update to take effect.\n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.src", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-PAE-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-doc-0:2.6.18-238.31.1.el5.noarch", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.i386", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:1813" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.src", "5Server-5.6.EUS:kernel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-PAE-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-PAE-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debug-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-debuginfo-common-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-devel-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-doc-0:2.6.18-238.31.1.el5.noarch", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.i386", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-headers-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-debuginfo-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.ppc64", "5Server-5.6.EUS:kernel-kdump-devel-0:2.6.18-238.31.1.el5.s390x", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-debuginfo-0:2.6.18-238.31.1.el5.x86_64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.i686", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.ia64", "5Server-5.6.EUS:kernel-xen-devel-0:2.6.18-238.31.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: xen: off-by-one shift in x86_64 __addr_ok()" } ] }
rhsa-2011_1212
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix multiple security issues and several bugs\nare now available for Red Hat Enterprise Linux 5.\n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The kernel packages contain the Linux kernel, the core of any Linux\noperating system.\n\nThis update fixes the following security issues:\n\n* A NULL pointer dereference flaw was found in the Linux kernel\u0027s Stream\nControl Transmission Protocol (SCTP) implementation. A remote attacker\ncould send a specially-crafted SCTP packet to a target system, resulting in\na denial of service. (CVE-2011-2482, Important)\n\n* A flaw in the Linux kernel\u0027s client-side NFS Lock Manager (NLM)\nimplementation could allow a local, unprivileged user to cause a denial of\nservice. (CVE-2011-2491, Important)\n\n* Buffer overflow flaws in the Linux kernel\u0027s netlink-based wireless\nconfiguration interface implementation could allow a local user, who has\nthe CAP_NET_ADMIN capability, to cause a denial of service or escalate\ntheir privileges on systems that have an active wireless interface.\n(CVE-2011-2517, Important)\n\n* A flaw was found in the way the Linux kernel\u0027s Xen hypervisor\nimplementation emulated the SAHF instruction. When using a\nfully-virtualized guest on a host that does not use hardware assisted\npaging (HAP), such as those running CPUs that do not have support for (or\nthose that have it disabled) Intel Extended Page Tables (EPT) or AMD\nVirtualization (AMD-V) Rapid Virtualization Indexing (RVI), a privileged\nguest user could trigger this flaw to cause the hypervisor to crash.\n(CVE-2011-2519, Moderate)\n\n* An off-by-one flaw was found in the __addr_ok() macro in the Linux\nkernel\u0027s Xen hypervisor implementation when running on 64-bit systems. A\nprivileged guest user could trigger this flaw to cause the hypervisor to\ncrash. (CVE-2011-2901, Moderate)\n\n* /proc/[PID]/io is world-readable by default. Previously, these files\ncould be read without any further restrictions. A local, unprivileged user\ncould read these files, belonging to other, possibly privileged processes\nto gather confidential information, such as the length of a password used\nin a process. (CVE-2011-2495, Low)\n\nRed Hat would like to thank Vasily Averin for reporting CVE-2011-2491, and\nVasiliy Kulikov of Openwall for reporting CVE-2011-2495.\n\nThis update also fixes several bugs. Documentation for these bug fixes will\nbe available shortly from the Technical Notes document linked to in the\nReferences section.\n\nUsers should upgrade to these updated packages, which contain backported\npatches to correct these issues, and fix the bugs noted in the Technical\nNotes. The system must be rebooted for this update to take effect.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2011:1212", "url": "https://access.redhat.com/errata/RHSA-2011:1212" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.7_Technical_Notes/kernel.html#RHSA-2011-1212", "url": "https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/5.7_Technical_Notes/kernel.html#RHSA-2011-1212" }, { "category": "external", "summary": "709393", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709393" }, { "category": "external", "summary": "712885", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=712885" }, { "category": "external", "summary": "714867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=714867" }, { "category": "external", "summary": "716825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=716825" }, { "category": "external", "summary": "718152", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=718152" }, { "category": "external", "summary": "718882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=718882" }, { "category": "external", "summary": "727590", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=727590" }, { "category": "external", "summary": "727835", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=727835" }, { "category": "external", "summary": "728042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=728042" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_1212.json" } ], "title": "Red Hat Security Advisory: kernel security and bug fix update", "tracking": { "current_release_date": "2024-11-22T04:34:25+00:00", "generator": { "date": "2024-11-22T04:34:25+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2011:1212", "initial_release_date": "2011-09-06T21:31:00+00:00", "revision_history": [ { "date": "2011-09-06T21:31:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2011-09-06T17:41:35+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T04:34:25+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux (v. 5 server)", "product": { "name": "Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:5::server" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "product": { "name": "kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "product_id": "kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-274.3.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "product_id": "kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-274.3.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-274.3.1.el5.i686", "product": { "name": "kernel-0:2.6.18-274.3.1.el5.i686", "product_id": "kernel-0:2.6.18-274.3.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-274.3.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-274.3.1.el5.i686", "product": { "name": "kernel-debug-0:2.6.18-274.3.1.el5.i686", "product_id": "kernel-debug-0:2.6.18-274.3.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-274.3.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "product": { "name": "kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "product_id": "kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-274.3.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "product": { "name": "kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "product_id": "kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-274.3.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "product": { "name": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "product_id": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-274.3.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "product_id": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-274.3.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-274.3.1.el5.i686", "product": { "name": "kernel-xen-0:2.6.18-274.3.1.el5.i686", "product_id": "kernel-xen-0:2.6.18-274.3.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-274.3.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-274.3.1.el5.i686", "product": { "name": "kernel-devel-0:2.6.18-274.3.1.el5.i686", "product_id": "kernel-devel-0:2.6.18-274.3.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-274.3.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-0:2.6.18-274.3.1.el5.i686", "product": { "name": "kernel-PAE-0:2.6.18-274.3.1.el5.i686", "product_id": "kernel-PAE-0:2.6.18-274.3.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-274.3.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "product": { "name": "kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "product_id": "kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-274.3.1.el5?arch=i686" } } }, { "category": "product_version", "name": "kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "product": { "name": "kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "product_id": "kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-274.3.1.el5?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-274.3.1.el5.i386", "product": { "name": "kernel-headers-0:2.6.18-274.3.1.el5.i386", "product_id": "kernel-headers-0:2.6.18-274.3.1.el5.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-274.3.1.el5?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "product_id": "kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-274.3.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "product_id": "kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-274.3.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-274.3.1.el5.x86_64", "product": { "name": "kernel-0:2.6.18-274.3.1.el5.x86_64", "product_id": "kernel-0:2.6.18-274.3.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-274.3.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "product": { "name": "kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "product_id": "kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-274.3.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "product": { "name": "kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "product_id": "kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-274.3.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "product_id": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-274.3.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "product_id": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-274.3.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "product": { "name": "kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "product_id": "kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-274.3.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "product": { "name": "kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "product_id": "kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-274.3.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "product": { "name": "kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "product_id": "kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-274.3.1.el5?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64", "product": { "name": "kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64", "product_id": "kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-274.3.1.el5?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.18-274.3.1.el5.src", "product": { "name": "kernel-0:2.6.18-274.3.1.el5.src", "product_id": "kernel-0:2.6.18-274.3.1.el5.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-274.3.1.el5?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.18-274.3.1.el5.noarch", "product": { "name": "kernel-doc-0:2.6.18-274.3.1.el5.noarch", "product_id": "kernel-doc-0:2.6.18-274.3.1.el5.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.18-274.3.1.el5?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "product": { "name": "kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "product_id": "kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-274.3.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "product": { "name": "kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "product_id": "kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-274.3.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-274.3.1.el5.ia64", "product": { "name": "kernel-0:2.6.18-274.3.1.el5.ia64", "product_id": "kernel-0:2.6.18-274.3.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-274.3.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-274.3.1.el5.ia64", "product": { "name": "kernel-debug-0:2.6.18-274.3.1.el5.ia64", "product_id": "kernel-debug-0:2.6.18-274.3.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-274.3.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "product": { "name": "kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "product_id": "kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-274.3.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "product_id": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-274.3.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "product_id": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-274.3.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-0:2.6.18-274.3.1.el5.ia64", "product": { "name": "kernel-xen-0:2.6.18-274.3.1.el5.ia64", "product_id": "kernel-xen-0:2.6.18-274.3.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen@2.6.18-274.3.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-274.3.1.el5.ia64", "product": { "name": "kernel-headers-0:2.6.18-274.3.1.el5.ia64", "product_id": "kernel-headers-0:2.6.18-274.3.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-274.3.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-274.3.1.el5.ia64", "product": { "name": "kernel-devel-0:2.6.18-274.3.1.el5.ia64", "product_id": "kernel-devel-0:2.6.18-274.3.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-274.3.1.el5?arch=ia64" } } }, { "category": "product_version", "name": "kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "product": { "name": "kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "product_id": "kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-274.3.1.el5?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "product_id": "kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-274.3.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "product": { "name": "kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "product_id": "kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-274.3.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-274.3.1.el5.ppc64", "product": { "name": "kernel-0:2.6.18-274.3.1.el5.ppc64", "product_id": "kernel-0:2.6.18-274.3.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-274.3.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "product": { "name": "kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "product_id": "kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-274.3.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "product_id": "kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-274.3.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "product": { "name": "kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "product_id": "kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-274.3.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "product": { "name": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "product_id": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-274.3.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "product_id": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-274.3.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "product": { "name": "kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "product_id": "kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-274.3.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "product": { "name": "kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "product_id": "kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-274.3.1.el5?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "product": { "name": "kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "product_id": "kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-274.3.1.el5?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-headers-0:2.6.18-274.3.1.el5.ppc", "product": { "name": "kernel-headers-0:2.6.18-274.3.1.el5.ppc", "product_id": "kernel-headers-0:2.6.18-274.3.1.el5.ppc", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-274.3.1.el5?arch=ppc" } } } ], "category": "architecture", "name": "ppc" }, { "branches": [ { "category": "product_version", "name": "kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "product": { "name": "kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "product_id": "kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-274.3.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "product": { "name": "kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "product_id": "kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-274.3.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.18-274.3.1.el5.s390x", "product": { "name": "kernel-0:2.6.18-274.3.1.el5.s390x", "product_id": "kernel-0:2.6.18-274.3.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.18-274.3.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-0:2.6.18-274.3.1.el5.s390x", "product": { "name": "kernel-debug-0:2.6.18-274.3.1.el5.s390x", "product_id": "kernel-debug-0:2.6.18-274.3.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug@2.6.18-274.3.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "product": { "name": "kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "product_id": "kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-274.3.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "product": { "name": "kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "product_id": "kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-devel@2.6.18-274.3.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "product": { "name": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "product_id": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-274.3.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "product": { "name": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "product_id": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debug-debuginfo@2.6.18-274.3.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-headers-0:2.6.18-274.3.1.el5.s390x", "product": { "name": "kernel-headers-0:2.6.18-274.3.1.el5.s390x", "product_id": "kernel-headers-0:2.6.18-274.3.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-headers@2.6.18-274.3.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-devel-0:2.6.18-274.3.1.el5.s390x", "product": { "name": "kernel-devel-0:2.6.18-274.3.1.el5.s390x", "product_id": "kernel-devel-0:2.6.18-274.3.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.18-274.3.1.el5?arch=s390x" } } }, { "category": "product_version", "name": "kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "product": { "name": "kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "product_id": "kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-274.3.1.el5?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-274.3.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64" }, "product_reference": "kernel-0:2.6.18-274.3.1.el5.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-274.3.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-274.3.1.el5.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-274.3.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x" }, "product_reference": "kernel-0:2.6.18-274.3.1.el5.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-274.3.1.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src" }, "product_reference": "kernel-0:2.6.18-274.3.1.el5.src", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-274.3.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-274.3.1.el5.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-274.3.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-274.3.1.el5.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-274.3.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-274.3.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-274.3.1.el5.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-274.3.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-274.3.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-274.3.1.el5.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-274.3.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-274.3.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-274.3.1.el5.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-274.3.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-274.3.1.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-274.3.1.el5.noarch", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-274.3.1.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-274.3.1.el5.i386", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-274.3.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-274.3.1.el5.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-274.3.1.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-274.3.1.el5.ppc", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-274.3.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-274.3.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-274.3.1.el5.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-274.3.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-274.3.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-274.3.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-274.3.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-274.3.1.el5.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-274.3.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)", "product_id": "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64", "relates_to_product_reference": "5Client-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-274.3.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64" }, "product_reference": "kernel-0:2.6.18-274.3.1.el5.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-274.3.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64" }, "product_reference": "kernel-0:2.6.18-274.3.1.el5.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-274.3.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x" }, "product_reference": "kernel-0:2.6.18-274.3.1.el5.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-274.3.1.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src" }, "product_reference": "kernel-0:2.6.18-274.3.1.el5.src", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.18-274.3.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64" }, "product_reference": "kernel-0:2.6.18-274.3.1.el5.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-PAE-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-debug-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-274.3.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64" }, "product_reference": "kernel-debug-0:2.6.18-274.3.1.el5.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-274.3.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64" }, "product_reference": "kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-274.3.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x" }, "product_reference": "kernel-debug-0:2.6.18-274.3.1.el5.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-0:2.6.18-274.3.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64" }, "product_reference": "kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64" }, "product_reference": "kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64" }, "product_reference": "kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64" }, "product_reference": "kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x" }, "product_reference": "kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64" }, "product_reference": "kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64" }, "product_reference": "kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-devel-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-274.3.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64" }, "product_reference": "kernel-devel-0:2.6.18-274.3.1.el5.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-274.3.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64" }, "product_reference": "kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-274.3.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x" }, "product_reference": "kernel-devel-0:2.6.18-274.3.1.el5.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.18-274.3.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64" }, "product_reference": "kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.18-274.3.1.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch" }, "product_reference": "kernel-doc-0:2.6.18-274.3.1.el5.noarch", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-274.3.1.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386" }, "product_reference": "kernel-headers-0:2.6.18-274.3.1.el5.i386", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-274.3.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64" }, "product_reference": "kernel-headers-0:2.6.18-274.3.1.el5.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-274.3.1.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc" }, "product_reference": "kernel-headers-0:2.6.18-274.3.1.el5.ppc", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-274.3.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64" }, "product_reference": "kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-274.3.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x" }, "product_reference": "kernel-headers-0:2.6.18-274.3.1.el5.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-headers-0:2.6.18-274.3.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64" }, "product_reference": "kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-274.3.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64" }, "product_reference": "kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-0:2.6.18-274.3.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x" }, "product_reference": "kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x" }, "product_reference": "kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64" }, "product_reference": "kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x" }, "product_reference": "kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-xen-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-274.3.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64" }, "product_reference": "kernel-xen-0:2.6.18-274.3.1.el5.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-0:2.6.18-274.3.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64" }, "product_reference": "kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64" }, "product_reference": "kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-274.3.1.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686" }, "product_reference": "kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64" }, "product_reference": "kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "relates_to_product_reference": "5Server-5.7.Z" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)", "product_id": "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64" }, "product_reference": "kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64", "relates_to_product_reference": "5Server-5.7.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2011-2482", "cwe": { "id": "CWE-476", "name": "NULL Pointer Dereference" }, "discovery_date": "2011-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "714867" } ], "notes": [ { "category": "description", "text": "A certain Red Hat patch to the sctp_sock_migrate function in net/sctp/socket.c in the Linux kernel before 2.6.21, as used in Red Hat Enterprise Linux (RHEL) 5, allows remote attackers to cause a denial of service (NULL pointer dereference and OOPS) via a crafted SCTP packet.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: sctp dos", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the Linux kernel as shipped with Red Hat Enterprise Linux 4 as it did not backport the upstream commit 3ab224be6d6. It did not affect the Linux kernels as shipped with Red Hat Enterprise Linux 6, and Red Hat Enterprise MRG as they have backported the upstream commit ea2bc483ff5 that Red Hat Enterprise Linux 5 did not. This has been addressed in Red Hat Enterprise Linux 5 via https://rhn.redhat.com/errata/RHSA-2011-1212.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2482" }, { "category": "external", "summary": "RHBZ#714867", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=714867" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2482", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2482" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2482", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2482" } ], "release_date": "2011-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-09-06T21:31:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:1212" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: sctp dos" }, { "acknowledgments": [ { "names": [ "Vasily Averin" ] } ], "cve": "CVE-2011-2491", "discovery_date": "2011-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "709393" } ], "notes": [ { "category": "description", "text": "The Network Lock Manager (NLM) protocol implementation in the NFS client functionality in the Linux kernel before 3.0 allows local users to cause a denial of service (system hang) via a LOCK_UN flock system call.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: rpc task leak after flock()ing NFS share", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2491" }, { "category": "external", "summary": "RHBZ#709393", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=709393" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2491", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2491" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2491", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2491" } ], "release_date": "2011-05-31T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-09-06T21:31:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:1212" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 4.9, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: rpc task leak after flock()ing NFS share" }, { "acknowledgments": [ { "names": [ "Vasiliy Kulikov" ], "organization": "Openwall" } ], "cve": "CVE-2011-2495", "discovery_date": "2011-06-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "716825" } ], "notes": [ { "category": "description", "text": "fs/proc/base.c in the Linux kernel before 2.6.39.4 does not properly restrict access to /proc/#####/io files, which allows local users to obtain sensitive I/O statistics by polling a file, as demonstrated by discovering the length of another user\u0027s password.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: /proc/PID/io infoleak", "title": "Vulnerability summary" }, { "category": "other", "text": "This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-1212.html, https://rhn.redhat.com/errata/RHSA-2011-1189.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html. Red Hat Enterprise Linux 4 is now in Production 3 of the maintenance life-cycle, https://access.redhat.com/support/policy/updates/errata/, therefore the fix for this issue is not currently planned to be included in the future updates.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2495" }, { "category": "external", "summary": "RHBZ#716825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=716825" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2495", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2495" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2495", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2495" } ], "release_date": "2011-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-09-06T21:31:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:1212" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "products": [ "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "kernel: /proc/PID/io infoleak" }, { "cve": "CVE-2011-2517", "discovery_date": "2011-06-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "718152" } ], "notes": [ { "category": "description", "text": "Multiple buffer overflows in net/wireless/nl80211.c in the Linux kernel before 2.6.39.2 allow local users to gain privileges by leveraging the CAP_NET_ADMIN capability during scan operations with a long SSID value.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: nl80211: missing check for valid SSID size in scan operations", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue did not affect the versions of Linux kernel as shipped with Red Hat\nEnterprise Linux 4 as it did not provide support for the Linux wireless LAN (802.11) configuration API. This has been addressed in Red Hat Enterprise Linux 5, 6 and Red Hat Enterprise MRG via https://rhn.redhat.com/errata/RHSA-2011-1212.html, https://rhn.redhat.com/errata/RHSA-2011-1189.html, and https://rhn.redhat.com/errata/RHSA-2011-1253.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2517" }, { "category": "external", "summary": "RHBZ#718152", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=718152" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2517", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2517" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2517", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2517" } ], "release_date": "2011-05-18T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-09-06T21:31:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:1212" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 6.6, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:S/C:C/I:C/A:C", "version": "2.0" }, "products": [ "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "kernel: nl80211: missing check for valid SSID size in scan operations" }, { "cve": "CVE-2011-2519", "discovery_date": "2011-07-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "718882" } ], "notes": [ { "category": "description", "text": "Xen in the Linux kernel, when running a guest on a host without hardware assisted paging (HAP), allows guest users to cause a denial of service (invalid pointer dereference and hypervisor crash) via the SAHF instruction.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xen: x86_emulate: fix SAHF emulation", "title": "Vulnerability summary" }, { "category": "other", "text": "This issue only affects Red Hat Enterprise Linux 5. The versions of the Linux\nkernel-xen as shipped with Red Hat Enterprise Linux 4, 6, and Red Hat Enterprise MRG are not affected. This has been addressed in Red Hat Enterprise Linux 5 via https://rhn.redhat.com/errata/RHSA-2011-1212.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2519" }, { "category": "external", "summary": "RHBZ#718882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=718882" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2519", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2519" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2519", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2519" } ], "release_date": "2011-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-09-06T21:31:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:1212" } ], "scores": [ { "cvss_v2": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 5.2, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:M/Au:S/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: xen: x86_emulate: fix SAHF emulation" }, { "cve": "CVE-2011-2901", "cwe": { "id": "CWE-193", "name": "Off-by-one Error" }, "discovery_date": "2011-08-04T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "728042" } ], "notes": [ { "category": "description", "text": "Off-by-one error in the __addr_ok macro in Xen 3.3 and earlier allows local 64 bit PV guest administrators to cause a denial of service (host crash) via unspecified hypercalls that ignore virtual-address bits.", "title": "Vulnerability description" }, { "category": "summary", "text": "kernel: xen: off-by-one shift in x86_64 __addr_ok()", "title": "Vulnerability summary" }, { "category": "other", "text": "The versions of the Linux kernel as shipped with Red Hat Enterprise Linux 4, 6,\nand Red Hat Enterprise MRG are not affected. This has been addressed in Red Hat Enterprise Linux 5 via https://rhn.redhat.com/errata/RHSA-2011-1212.html.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2011-2901" }, { "category": "external", "summary": "RHBZ#728042", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=728042" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2011-2901", "url": "https://www.cve.org/CVERecord?id=CVE-2011-2901" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-2901", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2901" } ], "release_date": "2011-08-30T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2011-09-06T21:31:00+00:00", "details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system.", "product_ids": [ "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64" ], "restart_required": { "category": "machine" }, "url": "https://access.redhat.com/errata/RHSA-2011:1212" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" }, "products": [ "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Client-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Client-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Client-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.src", "5Server-5.7.Z:kernel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-PAE-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-PAE-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debug-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-debuginfo-common-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-devel-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-doc-0:2.6.18-274.3.1.el5.noarch", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.i386", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-headers-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-debuginfo-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.ppc64", "5Server-5.7.Z:kernel-kdump-devel-0:2.6.18-274.3.1.el5.s390x", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-debuginfo-0:2.6.18-274.3.1.el5.x86_64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.i686", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.ia64", "5Server-5.7.Z:kernel-xen-devel-0:2.6.18-274.3.1.el5.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "kernel: xen: off-by-one shift in x86_64 __addr_ok()" } ] }
var-201310-0084
Vulnerability from variot
Off-by-one error in the __addr_ok macro in Xen 3.3 and earlier allows local 64 bit PV guest administrators to cause a denial of service (host crash) via unspecified hypercalls that ignore virtual-address bits. Xen is prone to a denial-of-service vulnerability due to an off-by-one error. An attacker with access to a guest operating system can exploit this issue to crash the host operating system, effectively denying service to legitimate users. Due to the nature of this issue arbitrary code-execution maybe possible; however this has not been confirmed,. Hitachi JP1 products are prone to a cross-site scripting vulnerability because they fail to properly sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. The following products are affected: JP1/IT Resource Management - Manager JP1/IT Service Level Management - Manager.
This update also fixes several bugs. Documentation for these bug fixes will be available shortly from the Technical Notes document linked to in the References section.
The Red Hat Security Response Team has rated this update as having important security impact. Common Vulnerability Scoring System (CVSS) base scores, which give detailed severity ratings, are available for each vulnerability from the CVE links in the References section. Relevant releases/architectures:
Red Hat Enterprise Linux EUS (v. 5.6 server) - i386, ia64, noarch, ppc, s390x, x86_64
- Description:
These packages contain the Linux kernel.
This update fixes the following security issues:
- A flaw in the Stream Control Transmission Protocol (SCTP) implementation could allow a remote attacker to cause a denial of service by sending a specially-crafted SCTP packet to a target system. (CVE-2011-2482, Important)
If you do not run applications that use SCTP, you can prevent the sctp module from being loaded by adding the following to the end of the "/etc/modprobe.d/blacklist.conf" file:
blacklist sctp
This way, the sctp module cannot be loaded accidentally, which may occur if an application that requires SCTP is started. A reboot is not necessary for this change to take effect.
-
A flaw in the client-side NFS Lock Manager (NLM) implementation could allow a local, unprivileged user to cause a denial of service. (CVE-2011-2491, Important)
-
Flaws in the netlink-based wireless configuration interface could allow a local user, who has the CAP_NET_ADMIN capability, to cause a denial of service or escalate their privileges on systems that have an active wireless interface. (CVE-2011-2517, Important)
-
A flaw was found in the way the Linux kernel's Xen hypervisor implementation emulated the SAHF instruction. When using a fully-virtualized guest on a host that does not use hardware assisted paging (HAP), such as those running CPUs that do not have support for (or those that have it disabled) Intel Extended Page Tables (EPT) or AMD Virtualization (AMD-V) Rapid Virtualization Indexing (RVI), a privileged guest user could trigger this flaw to cause the hypervisor to crash. (CVE-2011-2519, Moderate)
-
A flaw in the __addr_ok() macro in the Linux kernel's Xen hypervisor implementation when running on 64-bit systems could allow a privileged guest user to crash the hypervisor. (CVE-2011-2901, Moderate)
-
/proc/[PID]/io is world-readable by default. Previously, these files could be read without any further restrictions. A local, unprivileged user could read these files, belonging to other, possibly privileged processes to gather confidential information, such as the length of a password used in a process. (CVE-2011-2495, Low)
Red Hat would like to thank Vasily Averin for reporting CVE-2011-2491, and Vasiliy Kulikov of Openwall for reporting CVE-2011-2495.
This update also fixes the following bugs:
-
On Broadcom PCI cards that use the tg3 driver, the operational state of a network device, represented by the value in "/sys/class/net/ethX/operstate", was not initialized by default. Consequently, the state was reported as "unknown" when the tg3 network device was actually in the "up" state. This update modifies the tg3 driver to properly set the operstate value. (BZ#744699)
-
A KVM (Kernel-based Virtual Machine) guest can get preempted by the host, when a higher priority process needs to run. When a guest is not running for several timer interrupts in a row, ticks could be lost, resulting in the jiffies timer advancing slower than expected and timeouts taking longer than expected. To correct for the issue of lost ticks, do_timer_tsc_timekeeping() checks a reference clock source (kvm-clock when running as a KVM guest) to see if timer interrupts have been missed. If so, jiffies is incremented by the number of missed timer interrupts, ensuring that programs are woken up on time. (BZ#747874)
-
When a block device object was allocated, the bd_super field was not being explicitly initialized to NULL. Previously, users of the block device object could set bd_super to NULL when the object was released by calling the kill_block_super() function. Certain third-party file systems do not always use this function, and bd_super could therefore become uninitialized when the object was allocated again. This could cause a kernel panic in the blkdev_releasepage() function, when the uninitialized bd_super field was dereferenced. Now, bd_super is properly initialized in the bdget() function, and the kernel panic no longer occurs. (BZ#751137)
-
Solution:
Users should upgrade to these updated packages, which contain backported patches to resolve these issues. The system must be rebooted for this update to take effect.
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/kb/docs/DOC-11259
To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system. Bugs fixed (http://bugzilla.redhat.com/):
709393 - CVE-2011-2491 kernel: rpc task leak after flock()ing NFS share 714867 - CVE-2011-2482 kernel: sctp dos 716825 - CVE-2011-2495 kernel: /proc/PID/io infoleak 718152 - CVE-2011-2517 kernel: nl80211: missing check for valid SSID size in scan operations 718882 - CVE-2011-2519 kernel: xen: x86_emulate: fix SAHF emulation 728042 - CVE-2011-2901 kernel: xen: off-by-one shift in x86_64 __addr_ok()
- Package List:
Red Hat Enterprise Linux EUS (v. 5.6 server):
Source: kernel-2.6.18-238.31.1.el5.src.rpm
i386: kernel-2.6.18-238.31.1.el5.i686.rpm kernel-PAE-2.6.18-238.31.1.el5.i686.rpm kernel-PAE-debuginfo-2.6.18-238.31.1.el5.i686.rpm kernel-PAE-devel-2.6.18-238.31.1.el5.i686.rpm kernel-debug-2.6.18-238.31.1.el5.i686.rpm kernel-debug-debuginfo-2.6.18-238.31.1.el5.i686.rpm kernel-debug-devel-2.6.18-238.31.1.el5.i686.rpm kernel-debuginfo-2.6.18-238.31.1.el5.i686.rpm kernel-debuginfo-common-2.6.18-238.31.1.el5.i686.rpm kernel-devel-2.6.18-238.31.1.el5.i686.rpm kernel-headers-2.6.18-238.31.1.el5.i386.rpm kernel-xen-2.6.18-238.31.1.el5.i686.rpm kernel-xen-debuginfo-2.6.18-238.31.1.el5.i686.rpm kernel-xen-devel-2.6.18-238.31.1.el5.i686.rpm
ia64: kernel-2.6.18-238.31.1.el5.ia64.rpm kernel-debug-2.6.18-238.31.1.el5.ia64.rpm kernel-debug-debuginfo-2.6.18-238.31.1.el5.ia64.rpm kernel-debug-devel-2.6.18-238.31.1.el5.ia64.rpm kernel-debuginfo-2.6.18-238.31.1.el5.ia64.rpm kernel-debuginfo-common-2.6.18-238.31.1.el5.ia64.rpm kernel-devel-2.6.18-238.31.1.el5.ia64.rpm kernel-headers-2.6.18-238.31.1.el5.ia64.rpm kernel-xen-2.6.18-238.31.1.el5.ia64.rpm kernel-xen-debuginfo-2.6.18-238.31.1.el5.ia64.rpm kernel-xen-devel-2.6.18-238.31.1.el5.ia64.rpm
noarch: kernel-doc-2.6.18-238.31.1.el5.noarch.rpm
ppc: kernel-2.6.18-238.31.1.el5.ppc64.rpm kernel-debug-2.6.18-238.31.1.el5.ppc64.rpm kernel-debug-debuginfo-2.6.18-238.31.1.el5.ppc64.rpm kernel-debug-devel-2.6.18-238.31.1.el5.ppc64.rpm kernel-debuginfo-2.6.18-238.31.1.el5.ppc64.rpm kernel-debuginfo-common-2.6.18-238.31.1.el5.ppc64.rpm kernel-devel-2.6.18-238.31.1.el5.ppc64.rpm kernel-headers-2.6.18-238.31.1.el5.ppc.rpm kernel-headers-2.6.18-238.31.1.el5.ppc64.rpm kernel-kdump-2.6.18-238.31.1.el5.ppc64.rpm kernel-kdump-debuginfo-2.6.18-238.31.1.el5.ppc64.rpm kernel-kdump-devel-2.6.18-238.31.1.el5.ppc64.rpm
s390x: kernel-2.6.18-238.31.1.el5.s390x.rpm kernel-debug-2.6.18-238.31.1.el5.s390x.rpm kernel-debug-debuginfo-2.6.18-238.31.1.el5.s390x.rpm kernel-debug-devel-2.6.18-238.31.1.el5.s390x.rpm kernel-debuginfo-2.6.18-238.31.1.el5.s390x.rpm kernel-debuginfo-common-2.6.18-238.31.1.el5.s390x.rpm kernel-devel-2.6.18-238.31.1.el5.s390x.rpm kernel-headers-2.6.18-238.31.1.el5.s390x.rpm kernel-kdump-2.6.18-238.31.1.el5.s390x.rpm kernel-kdump-debuginfo-2.6.18-238.31.1.el5.s390x.rpm kernel-kdump-devel-2.6.18-238.31.1.el5.s390x.rpm
x86_64: kernel-2.6.18-238.31.1.el5.x86_64.rpm kernel-debug-2.6.18-238.31.1.el5.x86_64.rpm kernel-debug-debuginfo-2.6.18-238.31.1.el5.x86_64.rpm kernel-debug-devel-2.6.18-238.31.1.el5.x86_64.rpm kernel-debuginfo-2.6.18-238.31.1.el5.x86_64.rpm kernel-debuginfo-common-2.6.18-238.31.1.el5.x86_64.rpm kernel-devel-2.6.18-238.31.1.el5.x86_64.rpm kernel-headers-2.6.18-238.31.1.el5.x86_64.rpm kernel-xen-2.6.18-238.31.1.el5.x86_64.rpm kernel-xen-debuginfo-2.6.18-238.31.1.el5.x86_64.rpm kernel-xen-devel-2.6.18-238.31.1.el5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/#package
- References:
https://www.redhat.com/security/data/cve/CVE-2011-2482.html https://www.redhat.com/security/data/cve/CVE-2011-2491.html https://www.redhat.com/security/data/cve/CVE-2011-2495.html https://www.redhat.com/security/data/cve/CVE-2011-2517.html https://www.redhat.com/security/data/cve/CVE-2011-2519.html https://www.redhat.com/security/data/cve/CVE-2011-2901.html https://access.redhat.com/security/updates/classification/#important
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
VMware Security Advisory
Advisory ID: VMSA-2012-0001 Synopsis: VMware ESXi and ESX updates to third party library and ESX Service Console Issue date: 2012-01-30 Updated on: 2012-01-30 (initial advisory)
CVE numbers: --- COS Kernel --- CVE-2011-0726, CVE-2011-1078, CVE-2011-1079, CVE-2011-1080, CVE-2011-1093, CVE-2011-1163, CVE-2011-1166, CVE-2011-1170, CVE-2011-1171, CVE-2011-1172, CVE-2011-1494, CVE-2011-1495, CVE-2011-1577, CVE-2011-1763, CVE-2010-4649, CVE-2011-0695, CVE-2011-0711, CVE-2011-1044, CVE-2011-1182, CVE-2011-1573, CVE-2011-1576, CVE-2011-1593, CVE-2011-1745, CVE-2011-1746, CVE-2011-1776, CVE-2011-1936, CVE-2011-2022, CVE-2011-2213, CVE-2011-2492, CVE-2011-1780, CVE-2011-2525, CVE-2011-2689, CVE-2011-2482, CVE-2011-2491, CVE-2011-2495, CVE-2011-2517, CVE-2011-2519, CVE-2011-2901 --- COS cURL --- CVE-2011-2192 --- COS rpm --- CVE-2010-2059, CVE-2011-3378 --- COS samba --- CVE-2010-0547, CVE-2010-0787, CVE-2011-1678, CVE-2011-2522, CVE-2011-2694 --- COS python --- CVE-2009-3720, CVE-2010-3493, CVE-2011-1015, CVE-2011-1521 --- python library --- CVE-2009-3560, CVE-2009-3720, CVE-2010-1634, CVE-2010-2089, CVE-2011-1521
- Summary
VMware ESXi and ESX updates to third party library and ESX Service Console address several security issues.
- Relevant releases
ESXi 4.1 without patch ESXi410-201201401-SG
ESX 4.1 without patches ESX410-201201401-SG, ESX410-201201402-SG, ESX410-201201404-SG, ESX410-201201405-SG, ESX410-201201406-SG, ESX410-201201407-SG
- Problem Description
a. ESX third party update for Service Console kernel
The ESX Service Console Operating System (COS) kernel is updated to
kernel-2.6.18-274.3.1.el5 to fix multiple security issues in the
COS kernel.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2011-0726, CVE-2011-1078, CVE-2011-1079,
CVE-2011-1080, CVE-2011-1093, CVE-2011-1163, CVE-2011-1166,
CVE-2011-1170, CVE-2011-1171, CVE-2011-1172, CVE-2011-1494,
CVE-2011-1495, CVE-2011-1577, CVE-2011-1763, CVE-2010-4649,
CVE-2011-0695, CVE-2011-0711, CVE-2011-1044, CVE-2011-1182,
CVE-2011-1573, CVE-2011-1576, CVE-2011-1593, CVE-2011-1745,
CVE-2011-1746, CVE-2011-1776, CVE-2011-1936, CVE-2011-2022,
CVE-2011-2213, CVE-2011-2492, CVE-2011-1780, CVE-2011-2525,
CVE-2011-2689, CVE-2011-2482, CVE-2011-2491, CVE-2011-2495,
CVE-2011-2517, CVE-2011-2519, CVE-2011-2901 to these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.1 ESX ESX410-201201401-SG
ESX 4.0 ESX patch pending
ESX 3.5 ESX not applicable
- hosted products are VMware Workstation, Player, ACE, Fusion.
b. ESX third party update for Service Console cURL RPM
The ESX Service Console (COS) curl RPM is updated to cURL-7.15.5.9
resolving a security issues.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the name CVE-2011-2192 to this issue.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.1 ESX ESX410-201201402-SG
ESX 4.0 ESX patch pending
ESX 3.5 ESX not applicable
* hosted products are VMware Workstation, Player, ACE, Fusion.
c. ESX third party update for Service Console nspr and nss RPMs
The ESX Service Console (COS) nspr and nss RPMs are updated to
nspr-4.8.8-1.el5_7 and nss-3.12.10-4.el5_7 respectively resolving
a security issues.
A Certificate Authority (CA) issued fraudulent SSL certificates and
Netscape Portable Runtime (NSPR) and Network Security Services (NSS)
contain the built-in tokens of this fraudulent Certificate
Authority. This update renders all SSL certificates signed by the
fraudulent CA as untrusted for all uses.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.1 ESX ESX410-201201404-SG
ESX 4.0 ESX patch pending
ESX 3.5 ESX not applicable
* hosted products are VMware Workstation, Player, ACE, Fusion.
d. ESX third party update for Service Console rpm RPMs
The ESX Service Console Operating System (COS) rpm packages are
updated to popt-1.10.2.3-22.el5_7.2, rpm-4.4.2.3-22.el5_7.2,
rpm-libs-4.4.2.3-22.el5_7.2 and rpm-python-4.4.2.3-22.el5_7.2
which fixes multiple security issues.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2010-2059 and CVE-2011-3378 to these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.1 ESX ESX410-201201406-SG
ESX 4.0 ESX patch pending
ESX 3.5 ESX not applicable
* hosted products are VMware Workstation, Player, ACE, Fusion.
e. ESX third party update for Service Console samba RPMs
The ESX Service Console Operating System (COS) samba packages are
updated to samba-client-3.0.33-3.29.el5_7.4,
samba-common-3.0.33-3.29.el5_7.4 and
libsmbclient-3.0.33-3.29.el5_7.4 which fixes multiple security
issues in the Samba client.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2010-0547, CVE-2010-0787, CVE-2011-1678,
CVE-2011-2522 and CVE-2011-2694 to these issues.
Note that ESX does not include the Samba Web Administration Tool
(SWAT) and therefore ESX COS is not affected by CVE-2011-2522 and
CVE-2011-2694.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.1 ESX ESX410-201201407-SG
ESX 4.0 ESX patch pending
ESX 3.5 ESX not applicable
* hosted products are VMware Workstation, Player, ACE, Fusion.
f. ESX third party update for Service Console python package
The ESX Service Console (COS) python package is updated to
2.4.3-44 which fixes multiple security issues.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2009-3720, CVE-2010-3493, CVE-2011-1015 and
CVE-2011-1521 to these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter any Windows not affected
hosted * any any not affected
ESXi any ESXi not affected
ESX 4.1 ESX ESX410-201201405-SG
ESX 4.0 ESX patch pending
ESX 3.5 ESX not applicable
* hosted products are VMware Workstation, Player, ACE, Fusion.
g. ESXi update to third party component python
The python third party library is updated to python 2.5.6 which
fixes multiple security issues.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has
assigned the names CVE-2009-3560, CVE-2009-3720, CVE-2010-1634,
CVE-2010-2089, and CVE-2011-1521 to these issues.
Column 4 of the following table lists the action required to
remediate the vulnerability in each release, if a solution is
available.
VMware Product Running Replace with/
Product Version on Apply Patch
============= ======== ======= =================
vCenter any Windows not affected
hosted * any any not affected
ESXi 5.0 ESXi patch pending
ESXi 4.1 ESXi ESXi410-201201401-SG
ESXi 4.0 ESXi patch pending
ESXi 3.5 ESXi patch pending
ESX 4.1 ESX not affected
ESX 4.0 ESX not affected
ESX 3.5 ESX not affected
* hosted products are VMware Workstation, Player, ACE, Fusion.
- Solution
Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.
VMware ESXi 4.1
ESXi410-201201401
http://downloads.vmware.com/go/selfsupport-download
md5sum: BDF86F10A973346E26C9C2CD4C424E88
sha1sum: CC0B92869A9AAE4F5E0E5B81BEE109BCD7DA780F
http://kb.vmware.com/kb/2009143
ESXi410-201201401 contains ESXi410-201201401-SG
VMware ESX 4.1
ESX410-201201001
http://downloads.vmware.com/go/selfsupport-download
md5sum: 16DF9ACD3E74BCABC2494BC23AD0927F
sha1sum: 1066AE1436E1A75BA3D541AB65296CFB9AB7A5CC
http://kb.vmware.com/kb/2009142
ESX410-201201001 contains ESX410-201201401-SG, ESX410-201201402-SG, ESX410-201201404-SG, ESX410-201201405-SG, ESX410-201201406-SG and ESX410-201201407-SG
- References
CVE numbers
--- COS Kernel --- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0726 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1078 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1079 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1080 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1093 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1163 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1166 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1170 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1171 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1172 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1494 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1495 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1577 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1763 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4649 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0695 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0711 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1044 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1182 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1573 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1576 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1593 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1745 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1746 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1776 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1936 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2022 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2213 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2492 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1780 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2525 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2689 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2482 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2491 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2495 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2517 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2519 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2901 --- COS cURL --- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2192 --- COS rpm --- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2059 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3378 --- COS samba --- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0547 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0787 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1678 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2522 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2694 --- COS python --- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3493 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1015 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1521 --- python library --- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1634 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2089 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1521
- Change log
2012-01-30 VMSA-2012-0001 Initial security advisory in conjunction with the release of patches for ESX 4.1 and ESXi 4.1 on 2012-01-30.
- Contact
E-mail list for product security notifications and announcements: http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
- security-announce at lists.vmware.com
- bugtraq at securityfocus.com
- full-disclosure at lists.grok.org.uk
E-mail: security at vmware.com PGP key at: http://kb.vmware.com/kb/1055
VMware Security Advisories http://www.vmware.com/security/advisories
VMware security response policy http://www.vmware.com/support/policies/security_response.html
General support life cycle policy http://www.vmware.com/support/policies/eos.html
VMware Infrastructure support life cycle policy http://www.vmware.com/support/policies/eos_vi.html
Copyright 2012 VMware Inc. All rights reserved.
-----BEGIN PGP SIGNATURE----- Version: PGP Desktop 9.8.3 (Build 4028) Charset: utf-8
wj8DBQFPJ5DIDEcm8Vbi9kMRAnzCAKCmaAoDp49d61Mr1emzh/U0N8vbgACdFZk8 f2pLxi537s+ew4dvnYNWlJ8= =OAh4 -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 201309-24
http://security.gentoo.org/
Severity: High Title: Xen: Multiple vulnerabilities Date: September 27, 2013 Bugs: #385319, #386371, #420875, #431156, #454314, #464724, #472214, #482860 ID: 201309-24
Synopsis
Multiple vulnerabilities have been found in Xen, allowing attackers on a Xen Virtual Machine to execute arbitrary code, cause Denial of Service, or gain access to data on the host.
Background
Xen is a bare-metal hypervisor.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 app-emulation/xen < 4.2.2-r1 >= 4.2.2-r1 2 app-emulation/xen-tools < 4.2.2-r3 >= 4.2.2-r3 3 app-emulation/xen-pvgrub < 4.2.2-r1 >= 4.2.2-r1 ------------------------------------------------------------------- 3 affected packages
Description
Multiple vulnerabilities have been discovered in Xen. Please review the CVE identifiers referenced below for details.
Impact
Guest domains could possibly gain privileges, execute arbitrary code, or cause a Denial of Service on the host domain (Dom0). Additionally, guest domains could gain information about other virtual machines running on the same host or read arbitrary files on the host.
Workaround
The CVEs listed below do not currently have fixes, but only apply to Xen setups which have "tmem" specified on the hypervisor command line. TMEM is not currently supported for use in production systems, and administrators using tmem should disable it. Relevant CVEs: * CVE-2012-2497 * CVE-2012-6030 * CVE-2012-6031 * CVE-2012-6032 * CVE-2012-6033 * CVE-2012-6034 * CVE-2012-6035 * CVE-2012-6036
Resolution
All Xen users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=app-emulation/xen-4.2.2-r1"
All Xen-tools users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=app-emulation/xen-tools-4.2.2-r3"
All Xen-pvgrub users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot -v ">=app-emulation/xen-pvgrub-4.2.2-r1"
References
[ 1 ] CVE-2011-2901 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2901 [ 2 ] CVE-2011-3262 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3262 [ 3 ] CVE-2011-3262 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3262 [ 4 ] CVE-2012-0217 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0217 [ 5 ] CVE-2012-0218 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0218 [ 6 ] CVE-2012-2934 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2934 [ 7 ] CVE-2012-3432 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3432 [ 8 ] CVE-2012-3433 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3433 [ 9 ] CVE-2012-3494 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3494 [ 10 ] CVE-2012-3495 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3495 [ 11 ] CVE-2012-3496 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3496 [ 12 ] CVE-2012-3497 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3497 [ 13 ] CVE-2012-3498 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3498 [ 14 ] CVE-2012-3515 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3515 [ 15 ] CVE-2012-4411 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4411 [ 16 ] CVE-2012-4535 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4535 [ 17 ] CVE-2012-4536 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4536 [ 18 ] CVE-2012-4537 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4537 [ 19 ] CVE-2012-4538 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4538 [ 20 ] CVE-2012-4539 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4539 [ 21 ] CVE-2012-5510 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5510 [ 22 ] CVE-2012-5511 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5511 [ 23 ] CVE-2012-5512 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5512 [ 24 ] CVE-2012-5513 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5513 [ 25 ] CVE-2012-5514 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5514 [ 26 ] CVE-2012-5515 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5515 [ 27 ] CVE-2012-5525 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5525 [ 28 ] CVE-2012-5634 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5634 [ 29 ] CVE-2012-6030 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6030 [ 30 ] CVE-2012-6031 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6031 [ 31 ] CVE-2012-6032 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6032 [ 32 ] CVE-2012-6033 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6033 [ 33 ] CVE-2012-6034 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6034 [ 34 ] CVE-2012-6035 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6035 [ 35 ] CVE-2012-6036 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6036 [ 36 ] CVE-2012-6075 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6075 [ 37 ] CVE-2012-6333 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6333 [ 38 ] CVE-2013-0151 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0151 [ 39 ] CVE-2013-0152 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0152 [ 40 ] CVE-2013-0153 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0153 [ 41 ] CVE-2013-0154 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0154 [ 42 ] CVE-2013-0215 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0215 [ 43 ] CVE-2013-1432 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1432 [ 44 ] CVE-2013-1917 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1917 [ 45 ] CVE-2013-1918 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1918 [ 46 ] CVE-2013-1919 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1919 [ 47 ] CVE-2013-1920 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1920 [ 48 ] CVE-2013-1922 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1922 [ 49 ] CVE-2013-1952 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1952 [ 50 ] CVE-2013-1964 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1964 [ 51 ] CVE-2013-2076 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2076 [ 52 ] CVE-2013-2077 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2077 [ 53 ] CVE-2013-2078 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2078 [ 54 ] CVE-2013-2194 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2194 [ 55 ] CVE-2013-2195 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2195 [ 56 ] CVE-2013-2196 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2196 [ 57 ] CVE-2013-2211 http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2211 [ 58 ] Xen TMEM http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.h= tml
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
http://security.gentoo.org/glsa/glsa-201309-24.xml
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2013 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
http://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201310-0084", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "xen", "scope": "eq", "trust": 1.6, "vendor": "xen", "version": "3.0.3" }, { "model": "xen", "scope": "eq", "trust": 1.6, "vendor": "xen", "version": "3.2.2" }, { "model": "xen", "scope": "eq", "trust": 1.6, "vendor": "xen", "version": "3.0.4" }, { "model": "xen", "scope": "eq", "trust": 1.6, "vendor": "xen", "version": "3.0.2" }, { "model": "xen", "scope": "eq", "trust": 1.6, "vendor": "xen", "version": "3.1.4" }, { "model": "xen", "scope": "eq", "trust": 1.6, "vendor": "xen", "version": "3.2.3" }, { "model": "xen", "scope": "eq", "trust": 1.6, "vendor": "xen", "version": "3.1.3" }, { "model": "xen", "scope": "eq", "trust": 1.6, "vendor": "xen", "version": "3.2.0" }, { "model": "xen", "scope": "eq", "trust": 1.6, "vendor": "xen", "version": "3.2.1" }, { "model": "xen", "scope": "lte", "trust": 1.0, "vendor": "xen", "version": "3.3.0" }, { "model": "xen", "scope": "lte", "trust": 0.8, "vendor": "xen", "version": "3.3" }, { "model": "xen", "scope": "eq", "trust": 0.6, "vendor": "xen", "version": "3.3.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.2" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.43" }, { "model": "kernel -test6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31.1" }, { "model": "kernel rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.37" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14.6" }, { "model": "kernel rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.9" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.32.15" }, { "model": "kernel 2.6.36-rc8", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.46" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.38.3" }, { "model": "kernel 2.6.18-8.1.8.el5", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.48" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.26.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.32.16" }, { "model": "kernel 2.6.21-rc4", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.36" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.38" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.11" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.8" }, { "model": "kernel -test3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.34.1" }, { "model": "kernel rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.26" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31.6" }, { "model": "kernel 2.6.31-rc4", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.38.2" }, { "model": "kernel rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.4" }, { "model": "kernel 2.6.39-rc6", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "kernel git2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.3" }, { "model": "kernel git1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24.4" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.14" }, { "model": "kernel 2.6.36-rc4", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.6" }, { "model": "aura system platform sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.30" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.29.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.36.2" }, { "model": "kernel 2.6.35-rc5-git5", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel -rc6-git6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.4" }, { "model": "kernel 2.6.38-git18", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23" }, { "model": "kernel git4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.35.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13.5" }, { "model": "kernel rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.4" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.38.6" }, { "model": "kernel rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.267" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.7" }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.0" }, { "model": "kernel -test9-cvs", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.214" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "kernel 2.6.32-rc3", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xensource", "version": "3.3.1" }, { "model": "kernel 2.6.22-rc7", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.11" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.6" }, { "model": "kernel 2.6.33-rc6", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel 2.6.31-rc9", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.9" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.7" }, { "model": "kernel rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.13" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.32" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "5.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.16" }, { "model": "kernel 2.6.36-rc1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xensource", "version": "3.0.3" }, { "model": "linux enterprise sdk sp3", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "kernel rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.39" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.3" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xensource", "version": "4.0" }, { "model": "kernel rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.54" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "kernel rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.32.17" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.32.12" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.2" }, { "model": "kernel 2.6.24-rc2", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel 2.6.35-rc6", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.09" }, { "model": "kernel -test2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel 2.6.29-rc2", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel final", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.9" }, { "model": "kernel 2.6.37-rc2", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.6" }, { "model": "kernel 2.6.33-rc5", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.3" }, { "model": "kernel -git7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.9" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14" }, { "model": "kernel rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17" }, { "model": "kernel 2.6.31-git11", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.23" }, { "model": "conferencing standard edition", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.11" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.9" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.26" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.12" }, { "model": "kernel rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16" }, { "model": "kernel 2.6.29-rc1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.32.28" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.45" }, { "model": "kernel 2.6.31-rc2", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.38" }, { "model": "kernel 2.6.31-rc5-git3", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.12" }, { "model": "voice portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.39" }, { "model": "kernel rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.50" }, { "model": "kernel rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.47" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18" }, { "model": "kernel 2.6.35-rc5", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "voice portal sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.11" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xensource", "version": "3.0" }, { "model": "kernel -git1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.29" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.18" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.29.4" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xensource", "version": "3.1.1" }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.11" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.5" }, { "model": "aura messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "kernel rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.4" }, { "model": "kernel 2.6.32-rc8", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.33.1" }, { "model": "kernel -git14", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.29" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.273" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.36" }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.9" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.5" }, { "model": "kernel -test5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel -rc7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.8" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31.2" }, { "model": "kernel rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.8" }, { "model": "kernel rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.6" }, { "model": "kernel 2.6.22-rc1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel -test8", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.35" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.32.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14.3" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12" }, { "model": "kernel 2.6.27-git3", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20-2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.34" }, { "model": "kernel -rc8-git5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.6" }, { "model": "kernel 2.6.36-rc5", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel git5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.13" }, { "model": "kernel rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.12" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.32.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18.8" }, { "model": "voice portal sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel -rc7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.1" }, { "model": "linux enterprise server sp3", "scope": "eq", "trust": 0.3, "vendor": "suse", "version": "10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.1" }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.27" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.10" }, { "model": "kernel -test1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.33.7" }, { "model": "kernel rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.8.1" }, { "model": "kernel 2.6.35-rc4", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.14" }, { "model": "kernel rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.8" }, { "model": "kernel rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17" }, { "model": "kernel 2.6.28-rc5", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.32.6" }, { "model": "kernel 2.6.33-rc8", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.51" }, { "model": "xenserver common criteria", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.33" }, { "model": "aura system manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.5" }, { "model": "kernel 2.6.34-rc4", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.49" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31.11" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.9" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1" }, { "model": "esx", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.0" }, { "model": "kernel 2.6.37-rc7", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.24" }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.8" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.35.5" }, { "model": "kernel rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.10" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.14" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.6" }, { "model": "kernel rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.2712" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18-53" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.5" }, { "model": "kernel 2.6.34-rc2-git1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.37" }, { "model": "kernel rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.9" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.40" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.34.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14.2" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xensource", "version": "3.2" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30.3" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.5" }, { "model": "kernel 2.6.39-rc3", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel -rc7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.3" }, { "model": "kernel 2.6.25-rc1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.22" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14.4" }, { "model": "kernel 2.6.32-rc1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.32.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.14" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.9" }, { "model": "kernel -rc8", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "esx", "scope": "eq", "trust": 0.3, "vendor": "vmware", "version": "4.1" }, { "model": "kernel 2.6.32-rc2", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xensource", "version": "3.1.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15-27.48" }, { "model": "kernel git", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.216" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.25" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27.24" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24" }, { "model": "kernel rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11" }, { "model": "hat enterprise linux desktop client", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.26" }, { "model": "kernel 2.6.33-rc6-git5", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel 2.6.28-rc7", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19.3" }, { "model": "kernel 2.6.34-rc6", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.5" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.32.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.35" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.12" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.3" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17" }, { "model": "kernel rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.7" }, { "model": "kernel 2.6.20-rc2", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel git3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21" }, { "model": "kernel rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.10" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "kernel rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.32.18" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.32.11" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.3113" }, { "model": "kernel 2.6.32-rc4", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.2" }, { "model": "xenserver", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.5" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.38.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.12" }, { "model": "kernel rc7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.7" }, { "model": "kernel -git8", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.14" }, { "model": "kernel rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1" }, { "model": "kernel -git5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.3" }, { "model": "kernel git", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.217" }, { "model": "kernel 2.6.37-rc1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel 2.6.24-rc1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel -test7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.9" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.39" }, { "model": "kernel 2.6.32-rc5", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "1.1" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.22" }, { "model": "kernel rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "kernel rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24" }, { "model": "kernel rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21.2" }, { "model": "kernel 2.6.34-rc5", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21" }, { "model": "kernel 2.6.38-rc7", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.26.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.3" }, { "model": "xenserver", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.6" }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.32.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.1" }, { "model": "kernel 2.6.38-rc4", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "aura system manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14.1" }, { "model": "kernel 2.6.21-rc6", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel rc7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.51" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18.3" }, { "model": "aura session manager sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "kernel -git13", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.37.2" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19" }, { "model": "kernel -test11", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.16" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.6" }, { "model": "xen", "scope": "eq", "trust": 0.3, "vendor": "xensource", "version": "3.3" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23" }, { "model": "kernel -git8", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.29" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.46" }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.1" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16" }, { "model": "kernel rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19" }, { "model": "kernel 2.6.21-rc3", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel 2.6.26-rc5-git1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17" }, { "model": "kernel -rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30" }, { "model": "conferencing standard edition sp1", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.7" }, { "model": "hat enterprise linux eus 5.6.z server", "scope": null, "trust": 0.3, "vendor": "red", "version": null }, { "model": "aura session manager sp2", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.8" }, { "model": "kernel 2.6.33-rc4", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel 2.6.33-rc7", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.28" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30.10" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.52" }, { "model": "xenserver sp2", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.6" }, { "model": "aura presence services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "proactive contact", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.3" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "kernel rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.29" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.10" }, { "model": "kernel 2.6.21-rc5", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.34" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1.1" }, { "model": "kernel -test10", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.2" }, { "model": "kernel rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.11" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.12" }, { "model": "kernel rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.3" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.2519" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.32.4" }, { "model": "kernel rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18.6" }, { "model": "kernel 2.6.36-rc6", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.3" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.53" }, { "model": "kernel rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.9" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.41" }, { "model": "kernel -test4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "kernel 2.6.34-rc2", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.32.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "voice portal", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1.1" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.49" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "kernel 2.6.28-rc6", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "aura system platform sp3", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.21.6" }, { "model": "kernel 2.6.35-rc1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18.4" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.1" }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.26.3" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.2" }, { "model": "hat enterprise linux server", "scope": "eq", "trust": 0.3, "vendor": "red", "version": "5" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30.1" }, { "model": "aura system manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1613" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.31" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.2" }, { "model": "kernel 2.6.34-rc1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.29" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.6" }, { "model": "aura application enablement services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2.1" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.19" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24" }, { "model": "aura communication manager utility services", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0" }, { "model": "ip office application server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.17" }, { "model": "linux", "scope": null, "trust": 0.3, "vendor": "gentoo", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.14.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23.10" }, { "model": "kernel rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.11" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.32.3" }, { "model": "kernel 2.6.29-rc2-git1", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "aura communication manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "kernel 2.6.32-rc7", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.8" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.44" }, { "model": "aura session manager", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.2" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "aura system platform", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "6.0.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.32" }, { "model": "kernel rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.14" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "kernel 2.6.38-rc2", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.28.1" }, { "model": "xenserver feature pack", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.61" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.13" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.24.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.6" }, { "model": "kernel rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.19" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.32.22" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel 2.6.37rc", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.32.14" }, { "model": "kernel rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.35.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.4" }, { "model": "kernel rc7", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.12" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.32.9" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11.4" }, { "model": "kernel -rc4", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.15" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.9" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.7" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.32.8" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.33" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23" }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.31" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.26" }, { "model": "communication server 1000e signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.25.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20.5" }, { "model": "kernel rc6", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.18" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.22.13" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.21" }, { "model": "iq", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "5.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.276" }, { "model": "kernel 2.6.31-rc8", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.20" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.17" }, { "model": "kernel -rc1", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.23" }, { "model": "kernel 2.6.28-rc4", "scope": null, "trust": 0.3, "vendor": "linux", "version": null }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.315" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30.5" }, { "model": "communication server 1000m signaling server", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.1627" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.30.4" }, { "model": "kernel -rc3", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.11" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.16.20" }, { "model": "aura application server sip core", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "53002.1" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.13.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.26.4" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.34.3" }, { "model": "xenserver update", "scope": "eq", "trust": 0.3, "vendor": "citrix", "version": "5.03" }, { "model": "communication server 1000e", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.5" }, { "model": "kernel", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.17.12" }, { "model": "kernel -rc2", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.27" }, { "model": "kernel -rc5", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6.12" }, { "model": "communication server 1000m", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "7.0" }, { "model": "kernel -test9", "scope": "eq", "trust": 0.3, "vendor": "linux", "version": "2.6" }, { "model": "jp1/it service level management manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "-09-50" }, { "model": "jp1/it resource management-manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-50" }, { "model": "jp1/it resource management-manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-11-02" }, { "model": "jp1/it resource management-manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-11" }, { "model": "jp1/it resource management-manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-10-03" }, { "model": "jp1/it resource management-manager", "scope": "eq", "trust": 0.3, "vendor": "hitachi", "version": "09-10" }, { "model": "jp1/it service level management-manager", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "09-51" }, { "model": "jp1/it resource management-manager", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "09-50-02" }, { "model": "jp1/it resource management-manager", "scope": "ne", "trust": 0.3, "vendor": "hitachi", "version": "09-11-05" } ], "sources": [ { "db": "BID", "id": "49370" }, { "db": "BID", "id": "51749" }, { "db": "JVNDB", "id": "JVNDB-2011-005246" }, { "db": "CNNVD", "id": "CNNVD-201108-539" }, { "db": "NVD", "id": "CVE-2011-2901" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:xen:xen", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-005246" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Hitachi", "sources": [ { "db": "BID", "id": "51749" }, { "db": "CNNVD", "id": "CNNVD-201201-419" } ], "trust": 0.9 }, "cve": "CVE-2011-2901", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "ADJACENT_NETWORK", "authentication": "SINGLE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 5.5, "confidentialityImpact": "NONE", "exploitabilityScore": 5.1, "id": "CVE-2011-2901", "impactScore": 6.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:A/AC:L/Au:S/C:N/I:N/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-2901", "trust": 1.0, "value": "MEDIUM" }, { "author": "NVD", "id": "CVE-2011-2901", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-201108-539", "trust": 0.6, "value": "LOW" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-005246" }, { "db": "CNNVD", "id": "CNNVD-201108-539" }, { "db": "NVD", "id": "CVE-2011-2901" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Off-by-one error in the __addr_ok macro in Xen 3.3 and earlier allows local 64 bit PV guest administrators to cause a denial of service (host crash) via unspecified hypercalls that ignore virtual-address bits. Xen is prone to a denial-of-service vulnerability due to an off-by-one error. \nAn attacker with access to a guest operating system can exploit this issue to crash the host operating system, effectively denying service to legitimate users. Due to the nature of this issue arbitrary code-execution maybe possible; however this has not been confirmed,. Hitachi JP1 products are prone to a cross-site scripting vulnerability because they fail to properly sanitize user-supplied input. \nAn attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may help the attacker steal cookie-based authentication credentials and launch other attacks. \nThe following products are affected:\nJP1/IT Resource Management - Manager\nJP1/IT Service Level Management - Manager. \n\nThis update also fixes several bugs. Documentation for these bug fixes will\nbe available shortly from the Technical Notes document linked to in the\nReferences section. \n\nThe Red Hat Security Response Team has rated this update as having\nimportant security impact. Common Vulnerability Scoring System (CVSS) base\nscores, which give detailed severity ratings, are available for each\nvulnerability from the CVE links in the References section. Relevant releases/architectures:\n\nRed Hat Enterprise Linux EUS (v. 5.6 server) - i386, ia64, noarch, ppc, s390x, x86_64\n\n3. Description:\n\nThese packages contain the Linux kernel. \n\nThis update fixes the following security issues:\n\n* A flaw in the Stream Control Transmission Protocol (SCTP) implementation\ncould allow a remote attacker to cause a denial of service by sending a\nspecially-crafted SCTP packet to a target system. (CVE-2011-2482,\nImportant)\n\nIf you do not run applications that use SCTP, you can prevent the sctp\nmodule from being loaded by adding the following to the end of the\n\"/etc/modprobe.d/blacklist.conf\" file:\n\nblacklist sctp\n\nThis way, the sctp module cannot be loaded accidentally, which may occur\nif an application that requires SCTP is started. A reboot is not necessary\nfor this change to take effect. \n\n* A flaw in the client-side NFS Lock Manager (NLM) implementation could\nallow a local, unprivileged user to cause a denial of service. \n(CVE-2011-2491, Important)\n\n* Flaws in the netlink-based wireless configuration interface could allow\na local user, who has the CAP_NET_ADMIN capability, to cause a denial of\nservice or escalate their privileges on systems that have an active\nwireless interface. (CVE-2011-2517, Important)\n\n* A flaw was found in the way the Linux kernel\u0027s Xen hypervisor\nimplementation emulated the SAHF instruction. When using a\nfully-virtualized guest on a host that does not use hardware assisted\npaging (HAP), such as those running CPUs that do not have support for (or\nthose that have it disabled) Intel Extended Page Tables (EPT) or AMD\nVirtualization (AMD-V) Rapid Virtualization Indexing (RVI), a privileged\nguest user could trigger this flaw to cause the hypervisor to crash. \n(CVE-2011-2519, Moderate)\n\n* A flaw in the __addr_ok() macro in the Linux kernel\u0027s Xen hypervisor\nimplementation when running on 64-bit systems could allow a privileged\nguest user to crash the hypervisor. (CVE-2011-2901, Moderate)\n\n* /proc/[PID]/io is world-readable by default. Previously, these files\ncould be read without any further restrictions. A local, unprivileged user\ncould read these files, belonging to other, possibly privileged processes\nto gather confidential information, such as the length of a password used\nin a process. (CVE-2011-2495, Low)\n\nRed Hat would like to thank Vasily Averin for reporting CVE-2011-2491, and\nVasiliy Kulikov of Openwall for reporting CVE-2011-2495. \n\nThis update also fixes the following bugs:\n\n* On Broadcom PCI cards that use the tg3 driver, the operational state of a\nnetwork device, represented by the value in\n\"/sys/class/net/ethX/operstate\", was not initialized by default. \nConsequently, the state was reported as \"unknown\" when the tg3 network\ndevice was actually in the \"up\" state. This update modifies the tg3 driver\nto properly set the operstate value. (BZ#744699)\n\n* A KVM (Kernel-based Virtual Machine) guest can get preempted by the host,\nwhen a higher priority process needs to run. When a guest is not running\nfor several timer interrupts in a row, ticks could be lost, resulting in\nthe jiffies timer advancing slower than expected and timeouts taking longer\nthan expected. To correct for the issue of lost ticks,\ndo_timer_tsc_timekeeping() checks a reference clock source (kvm-clock when\nrunning as a KVM guest) to see if timer interrupts have been missed. If so,\njiffies is incremented by the number of missed timer interrupts, ensuring\nthat programs are woken up on time. (BZ#747874)\n\n* When a block device object was allocated, the bd_super field was not\nbeing explicitly initialized to NULL. Previously, users of the block device\nobject could set bd_super to NULL when the object was released by calling\nthe kill_block_super() function. Certain third-party file systems do not\nalways use this function, and bd_super could therefore become uninitialized\nwhen the object was allocated again. This could cause a kernel panic in the\nblkdev_releasepage() function, when the uninitialized bd_super field was\ndereferenced. Now, bd_super is properly initialized in the bdget()\nfunction, and the kernel panic no longer occurs. (BZ#751137)\n\n4. Solution:\n\nUsers should upgrade to these updated packages, which contain\nbackported patches to resolve these issues. The system must be\nrebooted for this update to take effect. \n\nBefore applying this update, make sure all previously-released errata\nrelevant to your system have been applied. \n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259\n\nTo install kernel packages manually, use \"rpm -ivh [package]\". Do not\nuse \"rpm -Uvh\" as that will remove the running kernel binaries from\nyour system. You may use \"rpm -e\" to remove old kernels after\ndetermining that the new kernel functions properly on your system. Bugs fixed (http://bugzilla.redhat.com/):\n\n709393 - CVE-2011-2491 kernel: rpc task leak after flock()ing NFS share\n714867 - CVE-2011-2482 kernel: sctp dos\n716825 - CVE-2011-2495 kernel: /proc/PID/io infoleak\n718152 - CVE-2011-2517 kernel: nl80211: missing check for valid SSID size in scan operations\n718882 - CVE-2011-2519 kernel: xen: x86_emulate: fix SAHF emulation\n728042 - CVE-2011-2901 kernel: xen: off-by-one shift in x86_64 __addr_ok()\n\n6. Package List:\n\nRed Hat Enterprise Linux EUS (v. 5.6 server):\n\nSource:\nkernel-2.6.18-238.31.1.el5.src.rpm\n\ni386:\nkernel-2.6.18-238.31.1.el5.i686.rpm\nkernel-PAE-2.6.18-238.31.1.el5.i686.rpm\nkernel-PAE-debuginfo-2.6.18-238.31.1.el5.i686.rpm\nkernel-PAE-devel-2.6.18-238.31.1.el5.i686.rpm\nkernel-debug-2.6.18-238.31.1.el5.i686.rpm\nkernel-debug-debuginfo-2.6.18-238.31.1.el5.i686.rpm\nkernel-debug-devel-2.6.18-238.31.1.el5.i686.rpm\nkernel-debuginfo-2.6.18-238.31.1.el5.i686.rpm\nkernel-debuginfo-common-2.6.18-238.31.1.el5.i686.rpm\nkernel-devel-2.6.18-238.31.1.el5.i686.rpm\nkernel-headers-2.6.18-238.31.1.el5.i386.rpm\nkernel-xen-2.6.18-238.31.1.el5.i686.rpm\nkernel-xen-debuginfo-2.6.18-238.31.1.el5.i686.rpm\nkernel-xen-devel-2.6.18-238.31.1.el5.i686.rpm\n\nia64:\nkernel-2.6.18-238.31.1.el5.ia64.rpm\nkernel-debug-2.6.18-238.31.1.el5.ia64.rpm\nkernel-debug-debuginfo-2.6.18-238.31.1.el5.ia64.rpm\nkernel-debug-devel-2.6.18-238.31.1.el5.ia64.rpm\nkernel-debuginfo-2.6.18-238.31.1.el5.ia64.rpm\nkernel-debuginfo-common-2.6.18-238.31.1.el5.ia64.rpm\nkernel-devel-2.6.18-238.31.1.el5.ia64.rpm\nkernel-headers-2.6.18-238.31.1.el5.ia64.rpm\nkernel-xen-2.6.18-238.31.1.el5.ia64.rpm\nkernel-xen-debuginfo-2.6.18-238.31.1.el5.ia64.rpm\nkernel-xen-devel-2.6.18-238.31.1.el5.ia64.rpm\n\nnoarch:\nkernel-doc-2.6.18-238.31.1.el5.noarch.rpm\n\nppc:\nkernel-2.6.18-238.31.1.el5.ppc64.rpm\nkernel-debug-2.6.18-238.31.1.el5.ppc64.rpm\nkernel-debug-debuginfo-2.6.18-238.31.1.el5.ppc64.rpm\nkernel-debug-devel-2.6.18-238.31.1.el5.ppc64.rpm\nkernel-debuginfo-2.6.18-238.31.1.el5.ppc64.rpm\nkernel-debuginfo-common-2.6.18-238.31.1.el5.ppc64.rpm\nkernel-devel-2.6.18-238.31.1.el5.ppc64.rpm\nkernel-headers-2.6.18-238.31.1.el5.ppc.rpm\nkernel-headers-2.6.18-238.31.1.el5.ppc64.rpm\nkernel-kdump-2.6.18-238.31.1.el5.ppc64.rpm\nkernel-kdump-debuginfo-2.6.18-238.31.1.el5.ppc64.rpm\nkernel-kdump-devel-2.6.18-238.31.1.el5.ppc64.rpm\n\ns390x:\nkernel-2.6.18-238.31.1.el5.s390x.rpm\nkernel-debug-2.6.18-238.31.1.el5.s390x.rpm\nkernel-debug-debuginfo-2.6.18-238.31.1.el5.s390x.rpm\nkernel-debug-devel-2.6.18-238.31.1.el5.s390x.rpm\nkernel-debuginfo-2.6.18-238.31.1.el5.s390x.rpm\nkernel-debuginfo-common-2.6.18-238.31.1.el5.s390x.rpm\nkernel-devel-2.6.18-238.31.1.el5.s390x.rpm\nkernel-headers-2.6.18-238.31.1.el5.s390x.rpm\nkernel-kdump-2.6.18-238.31.1.el5.s390x.rpm\nkernel-kdump-debuginfo-2.6.18-238.31.1.el5.s390x.rpm\nkernel-kdump-devel-2.6.18-238.31.1.el5.s390x.rpm\n\nx86_64:\nkernel-2.6.18-238.31.1.el5.x86_64.rpm\nkernel-debug-2.6.18-238.31.1.el5.x86_64.rpm\nkernel-debug-debuginfo-2.6.18-238.31.1.el5.x86_64.rpm\nkernel-debug-devel-2.6.18-238.31.1.el5.x86_64.rpm\nkernel-debuginfo-2.6.18-238.31.1.el5.x86_64.rpm\nkernel-debuginfo-common-2.6.18-238.31.1.el5.x86_64.rpm\nkernel-devel-2.6.18-238.31.1.el5.x86_64.rpm\nkernel-headers-2.6.18-238.31.1.el5.x86_64.rpm\nkernel-xen-2.6.18-238.31.1.el5.x86_64.rpm\nkernel-xen-debuginfo-2.6.18-238.31.1.el5.x86_64.rpm\nkernel-xen-devel-2.6.18-238.31.1.el5.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and \ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/#package\n\n7. References:\n\nhttps://www.redhat.com/security/data/cve/CVE-2011-2482.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-2491.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-2495.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-2517.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-2519.html\nhttps://www.redhat.com/security/data/cve/CVE-2011-2901.html\nhttps://access.redhat.com/security/updates/classification/#important\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2011 Red Hat, Inc. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\n ----------------------------------------------------------------------\n VMware Security Advisory\n\nAdvisory ID: VMSA-2012-0001\nSynopsis: VMware ESXi and ESX updates to third party library\n and ESX Service Console\nIssue date: 2012-01-30\nUpdated on: 2012-01-30 (initial advisory)\n\nCVE numbers: --- COS Kernel ---\n CVE-2011-0726, CVE-2011-1078, CVE-2011-1079,\n CVE-2011-1080, CVE-2011-1093, CVE-2011-1163,\n CVE-2011-1166, CVE-2011-1170, CVE-2011-1171,\n CVE-2011-1172, CVE-2011-1494, CVE-2011-1495,\n CVE-2011-1577, CVE-2011-1763, CVE-2010-4649,\n CVE-2011-0695, CVE-2011-0711, CVE-2011-1044,\n CVE-2011-1182, CVE-2011-1573, CVE-2011-1576,\n CVE-2011-1593, CVE-2011-1745, CVE-2011-1746,\n CVE-2011-1776, CVE-2011-1936, CVE-2011-2022,\n CVE-2011-2213, CVE-2011-2492, CVE-2011-1780,\n CVE-2011-2525, CVE-2011-2689, CVE-2011-2482,\n CVE-2011-2491, CVE-2011-2495, CVE-2011-2517,\n CVE-2011-2519, CVE-2011-2901\n --- COS cURL ---\n CVE-2011-2192\n --- COS rpm ---\n CVE-2010-2059, CVE-2011-3378\n --- COS samba ---\n CVE-2010-0547, CVE-2010-0787, CVE-2011-1678,\n CVE-2011-2522, CVE-2011-2694\n --- COS python ---\n CVE-2009-3720, CVE-2010-3493, CVE-2011-1015,\n CVE-2011-1521\n --- python library ---\n CVE-2009-3560, CVE-2009-3720, CVE-2010-1634,\n CVE-2010-2089, CVE-2011-1521\n ----------------------------------------------------------------------\n\n1. Summary\n\n VMware ESXi and ESX updates to third party library and ESX Service\n Console address several security issues. \n\n2. Relevant releases\n\n ESXi 4.1 without patch ESXi410-201201401-SG\n\n ESX 4.1 without patches ESX410-201201401-SG, ESX410-201201402-SG,\n ESX410-201201404-SG, ESX410-201201405-SG,\n ESX410-201201406-SG, ESX410-201201407-SG\n\n3. Problem Description\n\n a. ESX third party update for Service Console kernel\n\n The ESX Service Console Operating System (COS) kernel is updated to\n kernel-2.6.18-274.3.1.el5 to fix multiple security issues in the\n COS kernel. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n assigned the names CVE-2011-0726, CVE-2011-1078, CVE-2011-1079,\n CVE-2011-1080, CVE-2011-1093, CVE-2011-1163, CVE-2011-1166,\n CVE-2011-1170, CVE-2011-1171, CVE-2011-1172, CVE-2011-1494,\n CVE-2011-1495, CVE-2011-1577, CVE-2011-1763, CVE-2010-4649,\n CVE-2011-0695, CVE-2011-0711, CVE-2011-1044, CVE-2011-1182,\n CVE-2011-1573, CVE-2011-1576, CVE-2011-1593, CVE-2011-1745,\n CVE-2011-1746, CVE-2011-1776, CVE-2011-1936, CVE-2011-2022,\n CVE-2011-2213, CVE-2011-2492, CVE-2011-1780, CVE-2011-2525,\n CVE-2011-2689, CVE-2011-2482, CVE-2011-2491, CVE-2011-2495,\n CVE-2011-2517, CVE-2011-2519, CVE-2011-2901 to these issues. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.1 ESX ESX410-201201401-SG\n ESX 4.0 ESX patch pending\n ESX 3.5 ESX not applicable\n\n * hosted products are VMware Workstation, Player, ACE, Fusion. \n\n b. ESX third party update for Service Console cURL RPM\n\n The ESX Service Console (COS) curl RPM is updated to cURL-7.15.5.9\n resolving a security issues. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n assigned the name CVE-2011-2192 to this issue. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.1 ESX ESX410-201201402-SG\n ESX 4.0 ESX patch pending\n ESX 3.5 ESX not applicable\n\n * hosted products are VMware Workstation, Player, ACE, Fusion. \n\n c. ESX third party update for Service Console nspr and nss RPMs\n\n The ESX Service Console (COS) nspr and nss RPMs are updated to\n nspr-4.8.8-1.el5_7 and nss-3.12.10-4.el5_7 respectively resolving\n a security issues. \n\n A Certificate Authority (CA) issued fraudulent SSL certificates and\n Netscape Portable Runtime (NSPR) and Network Security Services (NSS)\n contain the built-in tokens of this fraudulent Certificate\n Authority. This update renders all SSL certificates signed by the\n fraudulent CA as untrusted for all uses. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.1 ESX ESX410-201201404-SG\n ESX 4.0 ESX patch pending\n ESX 3.5 ESX not applicable\n\n * hosted products are VMware Workstation, Player, ACE, Fusion. \n\n d. ESX third party update for Service Console rpm RPMs\n\n The ESX Service Console Operating System (COS) rpm packages are\n updated to popt-1.10.2.3-22.el5_7.2, rpm-4.4.2.3-22.el5_7.2,\n rpm-libs-4.4.2.3-22.el5_7.2 and rpm-python-4.4.2.3-22.el5_7.2\n which fixes multiple security issues. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n assigned the names CVE-2010-2059 and CVE-2011-3378 to these issues. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.1 ESX ESX410-201201406-SG\n ESX 4.0 ESX patch pending\n ESX 3.5 ESX not applicable\n\n * hosted products are VMware Workstation, Player, ACE, Fusion. \n\n\n e. ESX third party update for Service Console samba RPMs\n\n The ESX Service Console Operating System (COS) samba packages are\n updated to samba-client-3.0.33-3.29.el5_7.4,\n samba-common-3.0.33-3.29.el5_7.4 and\n libsmbclient-3.0.33-3.29.el5_7.4 which fixes multiple security\n issues in the Samba client. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n assigned the names CVE-2010-0547, CVE-2010-0787, CVE-2011-1678,\n CVE-2011-2522 and CVE-2011-2694 to these issues. \n\n Note that ESX does not include the Samba Web Administration Tool\n (SWAT) and therefore ESX COS is not affected by CVE-2011-2522 and\n CVE-2011-2694. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.1 ESX ESX410-201201407-SG\n ESX 4.0 ESX patch pending\n ESX 3.5 ESX not applicable\n\n * hosted products are VMware Workstation, Player, ACE, Fusion. \n\n f. ESX third party update for Service Console python package\n\n The ESX Service Console (COS) python package is updated to\n 2.4.3-44 which fixes multiple security issues. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n assigned the names CVE-2009-3720, CVE-2010-3493, CVE-2011-1015 and\n CVE-2011-1521 to these issues. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi any ESXi not affected\n\n ESX 4.1 ESX ESX410-201201405-SG\n ESX 4.0 ESX patch pending\n ESX 3.5 ESX not applicable\n\n * hosted products are VMware Workstation, Player, ACE, Fusion. \n\n g. ESXi update to third party component python\n\n The python third party library is updated to python 2.5.6 which\n fixes multiple security issues. \n\n The Common Vulnerabilities and Exposures project (cve.mitre.org) has\n assigned the names CVE-2009-3560, CVE-2009-3720, CVE-2010-1634,\n CVE-2010-2089, and CVE-2011-1521 to these issues. \n\n Column 4 of the following table lists the action required to\n remediate the vulnerability in each release, if a solution is\n available. \n\n VMware Product Running Replace with/\n Product Version on Apply Patch\n ============= ======== ======= =================\n vCenter any Windows not affected\n\n hosted * any any not affected\n\n ESXi 5.0 ESXi patch pending\n ESXi 4.1 ESXi ESXi410-201201401-SG\n ESXi 4.0 ESXi patch pending\n ESXi 3.5 ESXi patch pending\n\n ESX 4.1 ESX not affected\n ESX 4.0 ESX not affected\n ESX 3.5 ESX not affected\n\n * hosted products are VMware Workstation, Player, ACE, Fusion. \n\n\n4. Solution\n\n Please review the patch/release notes for your product and version\n and verify the checksum of your downloaded file. \n\n VMware ESXi 4.1\n ---------------\n ESXi410-201201401\n http://downloads.vmware.com/go/selfsupport-download\n md5sum: BDF86F10A973346E26C9C2CD4C424E88 \n sha1sum: CC0B92869A9AAE4F5E0E5B81BEE109BCD7DA780F\n http://kb.vmware.com/kb/2009143\n ESXi410-201201401 contains ESXi410-201201401-SG\n\n VMware ESX 4.1\n --------------\n ESX410-201201001\n http://downloads.vmware.com/go/selfsupport-download\n md5sum: 16DF9ACD3E74BCABC2494BC23AD0927F \n sha1sum: 1066AE1436E1A75BA3D541AB65296CFB9AB7A5CC\n http://kb.vmware.com/kb/2009142\n\n ESX410-201201001 contains ESX410-201201401-SG, ESX410-201201402-SG,\n ESX410-201201404-SG, ESX410-201201405-SG, ESX410-201201406-SG and\n ESX410-201201407-SG\n\n5. References\n\n CVE numbers\n\n --- COS Kernel ---\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0726\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1078\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1079\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1080\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1093\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1163\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1166\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1170\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1171\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1172\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1494\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1495\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1577\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1763\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-4649\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0695\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0711\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1044\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1182\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1573\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1576\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1593\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1745\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1746\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1776\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1936\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2022\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2213\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2492\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1780\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2525\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2689\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2482\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2491\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2495\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2517\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2519\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2901\n --- COS cURL ---\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2192\n --- COS rpm ---\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2059\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-3378\n --- COS samba ---\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0547\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-0787\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1678\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2522\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2694\n --- COS python ---\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-3493\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1015\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1521\n --- python library ---\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3560\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-3720\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-1634\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2010-2089\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1521\n\n ----------------------------------------------------------------------\n\n6. Change log\n\n 2012-01-30 VMSA-2012-0001\n Initial security advisory in conjunction with the release of patches\n for ESX 4.1 and ESXi 4.1 on 2012-01-30. \n\n ----------------------------------------------------------------------\n\n7. Contact\n\nE-mail list for product security notifications and announcements:\nhttp://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce\n\nThis Security Advisory is posted to the following lists:\n\n * security-announce at lists.vmware.com\n * bugtraq at securityfocus.com\n * full-disclosure at lists.grok.org.uk\n\nE-mail: security at vmware.com\nPGP key at: http://kb.vmware.com/kb/1055\n\nVMware Security Advisories\nhttp://www.vmware.com/security/advisories\n\nVMware security response policy\nhttp://www.vmware.com/support/policies/security_response.html\n\nGeneral support life cycle policy\nhttp://www.vmware.com/support/policies/eos.html\n\nVMware Infrastructure support life cycle policy\nhttp://www.vmware.com/support/policies/eos_vi.html\n\nCopyright 2012 VMware Inc. All rights reserved. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: PGP Desktop 9.8.3 (Build 4028)\nCharset: utf-8\n\nwj8DBQFPJ5DIDEcm8Vbi9kMRAnzCAKCmaAoDp49d61Mr1emzh/U0N8vbgACdFZk8\nf2pLxi537s+ew4dvnYNWlJ8=\n=OAh4\n-----END PGP SIGNATURE-----\n. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 201309-24\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n http://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: Xen: Multiple vulnerabilities\n Date: September 27, 2013\n Bugs: #385319, #386371, #420875, #431156, #454314, #464724,\n #472214, #482860\n ID: 201309-24\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n========\n\nMultiple vulnerabilities have been found in Xen, allowing attackers on\na Xen Virtual Machine to execute arbitrary code, cause Denial of\nService, or gain access to data on the host. \n\nBackground\n==========\n\nXen is a bare-metal hypervisor. \n\nAffected packages\n=================\n\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 app-emulation/xen \u003c 4.2.2-r1 \u003e= 4.2.2-r1\n 2 app-emulation/xen-tools \u003c 4.2.2-r3 \u003e= 4.2.2-r3\n 3 app-emulation/xen-pvgrub\n \u003c 4.2.2-r1 \u003e= 4.2.2-r1\n -------------------------------------------------------------------\n 3 affected packages\n\nDescription\n===========\n\nMultiple vulnerabilities have been discovered in Xen. Please review the\nCVE identifiers referenced below for details. \n\nImpact\n======\n\nGuest domains could possibly gain privileges, execute arbitrary code,\nor cause a Denial of Service on the host domain (Dom0). Additionally,\nguest domains could gain information about other virtual machines\nrunning on the same host or read arbitrary files on the host. \n\nWorkaround\n==========\n\nThe CVEs listed below do not currently have fixes, but only apply to\nXen setups which have \"tmem\" specified on the hypervisor command line. \nTMEM is not currently supported for use in production systems, and\nadministrators using tmem should disable it. \nRelevant CVEs:\n* CVE-2012-2497\n* CVE-2012-6030\n* CVE-2012-6031\n* CVE-2012-6032\n* CVE-2012-6033\n* CVE-2012-6034\n* CVE-2012-6035\n* CVE-2012-6036\n\nResolution\n==========\n\nAll Xen users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=app-emulation/xen-4.2.2-r1\"\n\nAll Xen-tools users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=app-emulation/xen-tools-4.2.2-r3\"\n\nAll Xen-pvgrub users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot -v \"\u003e=app-emulation/xen-pvgrub-4.2.2-r1\"\n\nReferences\n==========\n\n[ 1 ] CVE-2011-2901\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-2901\n[ 2 ] CVE-2011-3262\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3262\n[ 3 ] CVE-2011-3262\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2011-3262\n[ 4 ] CVE-2012-0217\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0217\n[ 5 ] CVE-2012-0218\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-0218\n[ 6 ] CVE-2012-2934\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-2934\n[ 7 ] CVE-2012-3432\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3432\n[ 8 ] CVE-2012-3433\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3433\n[ 9 ] CVE-2012-3494\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3494\n[ 10 ] CVE-2012-3495\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3495\n[ 11 ] CVE-2012-3496\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3496\n[ 12 ] CVE-2012-3497\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3497\n[ 13 ] CVE-2012-3498\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3498\n[ 14 ] CVE-2012-3515\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-3515\n[ 15 ] CVE-2012-4411\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4411\n[ 16 ] CVE-2012-4535\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4535\n[ 17 ] CVE-2012-4536\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4536\n[ 18 ] CVE-2012-4537\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4537\n[ 19 ] CVE-2012-4538\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4538\n[ 20 ] CVE-2012-4539\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-4539\n[ 21 ] CVE-2012-5510\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5510\n[ 22 ] CVE-2012-5511\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5511\n[ 23 ] CVE-2012-5512\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5512\n[ 24 ] CVE-2012-5513\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5513\n[ 25 ] CVE-2012-5514\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5514\n[ 26 ] CVE-2012-5515\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5515\n[ 27 ] CVE-2012-5525\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5525\n[ 28 ] CVE-2012-5634\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-5634\n[ 29 ] CVE-2012-6030\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6030\n[ 30 ] CVE-2012-6031\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6031\n[ 31 ] CVE-2012-6032\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6032\n[ 32 ] CVE-2012-6033\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6033\n[ 33 ] CVE-2012-6034\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6034\n[ 34 ] CVE-2012-6035\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6035\n[ 35 ] CVE-2012-6036\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6036\n[ 36 ] CVE-2012-6075\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6075\n[ 37 ] CVE-2012-6333\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2012-6333\n[ 38 ] CVE-2013-0151\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0151\n[ 39 ] CVE-2013-0152\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0152\n[ 40 ] CVE-2013-0153\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0153\n[ 41 ] CVE-2013-0154\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0154\n[ 42 ] CVE-2013-0215\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-0215\n[ 43 ] CVE-2013-1432\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1432\n[ 44 ] CVE-2013-1917\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1917\n[ 45 ] CVE-2013-1918\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1918\n[ 46 ] CVE-2013-1919\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1919\n[ 47 ] CVE-2013-1920\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1920\n[ 48 ] CVE-2013-1922\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1922\n[ 49 ] CVE-2013-1952\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1952\n[ 50 ] CVE-2013-1964\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-1964\n[ 51 ] CVE-2013-2076\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2076\n[ 52 ] CVE-2013-2077\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2077\n[ 53 ] CVE-2013-2078\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2078\n[ 54 ] CVE-2013-2194\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2194\n[ 55 ] CVE-2013-2195\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2195\n[ 56 ] CVE-2013-2196\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2196\n[ 57 ] CVE-2013-2211\n http://nvd.nist.gov/nvd.cfm?cvename=CVE-2013-2211\n[ 58 ] Xen TMEM\n http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.h=\ntml\n\nAvailability\n============\n\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n http://security.gentoo.org/glsa/glsa-201309-24.xml\n\nConcerns?\n=========\n\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n=======\n\nCopyright 2013 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttp://creativecommons.org/licenses/by-sa/2.5\n", "sources": [ { "db": "NVD", "id": "CVE-2011-2901" }, { "db": "JVNDB", "id": "JVNDB-2011-005246" }, { "db": "BID", "id": "49370" }, { "db": "BID", "id": "51749" }, { "db": "PACKETSTORM", "id": "104843" }, { "db": "PACKETSTORM", "id": "107847" }, { "db": "PACKETSTORM", "id": "109299" }, { "db": "PACKETSTORM", "id": "123421" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-2901", "trust": 3.1 }, { "db": "SECUNIA", "id": "55082", "trust": 1.6 }, { "db": "OPENWALL", "id": "OSS-SECURITY/2011/09/02/2", "trust": 1.6 }, { "db": "BID", "id": "51749", "trust": 0.9 }, { "db": "JVNDB", "id": "JVNDB-2011-005246", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201201-419", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-201108-539", "trust": 0.6 }, { "db": "BID", "id": "49370", "trust": 0.3 }, { "db": "HITACHI", "id": "HS12-005", "trust": 0.3 }, { "db": "PACKETSTORM", "id": "104843", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "107847", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "109299", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "123421", "trust": 0.1 } ], "sources": [ { "db": "BID", "id": "49370" }, { "db": "BID", "id": "51749" }, { "db": "JVNDB", "id": "JVNDB-2011-005246" }, { "db": "PACKETSTORM", "id": "104843" }, { "db": "PACKETSTORM", "id": "107847" }, { "db": "PACKETSTORM", "id": "109299" }, { "db": "PACKETSTORM", "id": "123421" }, { "db": "CNNVD", "id": "CNNVD-201201-419" }, { "db": "CNNVD", "id": "CNNVD-201108-539" }, { "db": "NVD", "id": "CVE-2011-2901" } ] }, "id": "VAR-201310-0084", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.225 }, "last_update_date": "2024-10-16T22:11:32.237000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "Bug 728042", "trust": 0.8, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=728042" }, { "title": "Xen Security Advisory 4 (CVE-2011-2901) - Xen 3.3 vaddr validation", "trust": 0.8, "url": "http://lists.xen.org/archives/html/xen-devel/2011-09/msg00119.html" }, { "title": "Xen Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=234536" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-005246" }, { "db": "CNNVD", "id": "CNNVD-201108-539" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-399", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-005246" }, { "db": "NVD", "id": "CVE-2011-2901" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 1.9, "url": "https://bugzilla.redhat.com/show_bug.cgi?id=728042" }, { "trust": 1.7, "url": "http://rhn.redhat.com/errata/rhsa-2011-1212.html" }, { "trust": 1.7, "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" }, { "trust": 1.6, "url": "http://www.openwall.com/lists/oss-security/2011/09/02/2" }, { "trust": 1.6, "url": "http://secunia.com/advisories/55082" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2901" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-2901" }, { "trust": 0.6, "url": "http://www.securityfocus.com/bid/51749" }, { "trust": 0.6, "url": "https://access.redhat.com/security/cve/cve-2011-2901" }, { "trust": 0.6, "url": "https://access.redhat.com/errata/rhsa-2011:1813" }, { "trust": 0.6, "url": "https://access.redhat.com/errata/rhsa-2011:1212" }, { "trust": 0.3, "url": "http://wiki.openvz.org/download/kernel/rhel5/028stab094.3" }, { "trust": 0.3, "url": "http://www.vmware.com/security/advisories/vmsa-2012-0001.html" }, { "trust": 0.3, "url": "http://xen.xensource.com/" }, { "trust": 0.3, "url": "http://support.avaya.com/css/p8/documents/100151103" }, { "trust": 0.3, "url": "http://support.citrix.com/article/ctx130325" }, { "trust": 0.3, "url": "http://www.hds.com/products/storage-software/hitachi-device-manager.html" }, { "trust": 0.3, "url": "http://www.hitachi.co.jp/prod/comp/soft1/global/security/info/vuls/hs12-005/index.html" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2901" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2011-2901.html" }, { "trust": 0.2, "url": "https://access.redhat.com/kb/docs/doc-11259" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2517" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2495" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2491" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2011-2495.html" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2482" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2011-2482.html" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.2, "url": "https://www.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-2519" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2011-2519.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2011-2491.html" }, { "trust": 0.2, "url": "https://www.redhat.com/security/data/cve/cve-2011-2517.html" }, { "trust": 0.2, "url": "https://access.redhat.com/security/team/key/#package" }, { "trust": 0.2, "url": "http://bugzilla.redhat.com/):" }, { "trust": 0.1, "url": "https://docs.redhat.com/docs/en-us/red_hat_enterprise_linux/5/html/5.7_technical_notes/kernel.html#rhsa-2011-1212" }, { "trust": 0.1, "url": "https://rhn.redhat.com/errata/rhsa-2011-1813.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0711" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2495" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2522" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1166" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1015" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1163" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1573" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1093" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1780" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2525" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1746" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/1055" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2192" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-4649" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-4649" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1078" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1170" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1745" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1015" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3560" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1163" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1936" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1494" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1573" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2689" }, { "trust": 0.1, "url": "http://downloads.vmware.com/go/selfsupport-download" }, { "trust": 0.1, "url": "http://www.vmware.com/support/policies/eos_vi.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2519" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0726" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3560" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2009143" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1763" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1166" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1044" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2482" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-3493" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1078" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1521" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0711" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1171" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2213" }, { "trust": 0.1, "url": "http://www.vmware.com/support/policies/eos.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1079" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0547" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-0787" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1521" }, { "trust": 0.1, "url": "http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1577" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2491" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2059" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1172" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1172" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0726" }, { "trust": 0.1, "url": "http://www.vmware.com/security/advisories" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-2089" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3720" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1678" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1182" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1080" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1080" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-1634" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-0695" }, { "trust": 0.1, "url": "http://www.vmware.com/support/policies/security_response.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1494" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0787" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0695" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2517" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1079" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1044" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3720" }, { "trust": 0.1, "url": "http://kb.vmware.com/kb/2009142" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2022" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1593" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1182" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1170" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2089" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2694" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-0547" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-2492" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-2059" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1495" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1093" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2010-3493" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1576" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-3378" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2010-1634" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-1171" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1495" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-1776" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-6075" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4536" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2196" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-5634" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1952" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2211" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-6333" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4535" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2195" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2077" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4535" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-6030" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1920" }, { "trust": 0.1, "url": "http://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4538" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0152" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5514" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-6036" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1922" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3433" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5525" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3497" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2078" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4536" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3495" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-6031" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0217" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4537" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2194" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-3262" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-5511" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4411" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4538" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-2934" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3495" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5510" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3433" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4539" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3494" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0153" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-2076" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3432" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5515" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-6033" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-2934" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4537" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5634" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2011-2901" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-5514" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-6035" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-6032" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3515" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5512" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1917" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0218" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3498" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1432" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3432" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1964" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2011-3262" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3498" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0154" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3497" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3494" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-5515" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0215" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-5513" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5513" }, { "trust": 0.1, "url": "http://lists.xen.org/archives/html/xen-announce/2012-09/msg00006.h=" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-0218" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-5525" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-4411" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-6034" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-4539" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-0151" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3515" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-3496" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1919" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-0217" }, { "trust": 0.1, "url": "http://security.gentoo.org/" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-5510" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2012-5511" }, { "trust": 0.1, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2013-1918" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-3496" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2012-5512" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." } ], "sources": [ { "db": "BID", "id": "49370" }, { "db": "BID", "id": "51749" }, { "db": "JVNDB", "id": "JVNDB-2011-005246" }, { "db": "PACKETSTORM", "id": "104843" }, { "db": "PACKETSTORM", "id": "107847" }, { "db": "PACKETSTORM", "id": "109299" }, { "db": "PACKETSTORM", "id": "123421" }, { "db": "CNNVD", "id": "CNNVD-201201-419" }, { "db": "CNNVD", "id": "CNNVD-201108-539" }, { "db": "NVD", "id": "CVE-2011-2901" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "BID", "id": "49370" }, { "db": "BID", "id": "51749" }, { "db": "JVNDB", "id": "JVNDB-2011-005246" }, { "db": "PACKETSTORM", "id": "104843" }, { "db": "PACKETSTORM", "id": "107847" }, { "db": "PACKETSTORM", "id": "109299" }, { "db": "PACKETSTORM", "id": "123421" }, { "db": "CNNVD", "id": "CNNVD-201201-419" }, { "db": "CNNVD", "id": "CNNVD-201108-539" }, { "db": "NVD", "id": "CVE-2011-2901" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-08-30T00:00:00", "db": "BID", "id": "49370" }, { "date": "2012-01-31T00:00:00", "db": "BID", "id": "51749" }, { "date": "2013-10-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-005246" }, { "date": "2011-09-07T00:57:26", "db": "PACKETSTORM", "id": "104843" }, { "date": "2011-12-14T02:33:20", "db": "PACKETSTORM", "id": "107847" }, { "date": "2012-01-30T12:12:00", "db": "PACKETSTORM", "id": "109299" }, { "date": "2013-09-27T22:24:40", "db": "PACKETSTORM", "id": "123421" }, { "date": "1900-01-01T00:00:00", "db": "CNNVD", "id": "CNNVD-201201-419" }, { "date": "2011-09-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201108-539" }, { "date": "2013-10-01T17:55:02.960000", "db": "NVD", "id": "CVE-2011-2901" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2013-10-09T01:25:00", "db": "BID", "id": "49370" }, { "date": "2012-01-31T00:00:00", "db": "BID", "id": "51749" }, { "date": "2013-10-04T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-005246" }, { "date": "2012-02-02T00:00:00", "db": "CNNVD", "id": "CNNVD-201201-419" }, { "date": "2023-04-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201108-539" }, { "date": "2023-02-13T04:31:28.443000", "db": "NVD", "id": "CVE-2011-2901" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201201-419" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Xen of __addr_ok Service disruption in macro (DoS) Vulnerabilities", "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-005246" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "XSS", "sources": [ { "db": "CNNVD", "id": "CNNVD-201201-419" } ], "trust": 0.6 } }
ghsa-596h-97jg-mfff
Vulnerability from github
Off-by-one error in the __addr_ok macro in Xen 3.3 and earlier allows local 64 bit PV guest administrators to cause a denial of service (host crash) via unspecified hypercalls that ignore virtual-address bits.
{ "affected": [], "aliases": [ "CVE-2011-2901" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2013-10-01T17:55:00Z", "severity": "MODERATE" }, "details": "Off-by-one error in the __addr_ok macro in Xen 3.3 and earlier allows local 64 bit PV guest administrators to cause a denial of service (host crash) via unspecified hypercalls that ignore virtual-address bits.", "id": "GHSA-596h-97jg-mfff", "modified": "2022-05-17T04:55:29Z", "published": "2022-05-17T04:55:29Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2011-2901" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2011:1212" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2011:1813" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2011-2901" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=728042" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2011-1212.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/55082" }, { "type": "WEB", "url": "http://security.gentoo.org/glsa/glsa-201309-24.xml" }, { "type": "WEB", "url": "http://www.openwall.com/lists/oss-security/2011/09/02/2" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.