Action not permitted
Modal body text goes here.
CVE-2004-0791
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:31:47.561Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "oval:org.mitre.oval:def:1112", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1112" }, { "name": "oval:org.mitre.oval:def:184", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A184" }, { "name": "13124", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/13124" }, { "name": "HPSBUX01164", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/418882/100/0/threaded" }, { "name": "RHSA-2005:017", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-017.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html" }, { "name": "FLSA:157459-2", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/428058/100/0/threaded" }, { "name": "RHSA-2005:016", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-016.html" }, { "name": "oval:org.mitre.oval:def:10228", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10228" }, { "name": "RHSA-2005:043", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-043.html" }, { "name": "SSRT4743", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=112861397904255\u0026w=2" }, { "name": "HPSBTU01210", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=112861397904255\u0026w=2" }, { "name": "57746", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1" }, { "name": "oval:org.mitre.oval:def:596", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A596" }, { "name": "101658", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1" }, { "name": "SCOSA-2006.4", "tags": [ "vendor-advisory", "x_refsource_SCO", "x_transferred" ], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4/SCOSA-2006.4.txt" }, { "name": "SSRT4884", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=112861397904255\u0026w=2" }, { "name": "18317", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18317" }, { "name": "FLSA:157459-1", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/428028/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:464", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A464" }, { "name": "oval:org.mitre.oval:def:726", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A726" }, { "name": "oval:org.mitre.oval:def:688", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A688" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en" }, { "name": "19", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/19" }, { "name": "57", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/57" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-04-12T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the \"ICMP Source Quench attack.\" NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "oval:org.mitre.oval:def:1112", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1112" }, { "name": "oval:org.mitre.oval:def:184", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A184" }, { "name": "13124", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/13124" }, { "name": "HPSBUX01164", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://www.securityfocus.com/archive/1/418882/100/0/threaded" }, { "name": "RHSA-2005:017", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-017.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html" }, { "name": "FLSA:157459-2", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.securityfocus.com/archive/1/428058/100/0/threaded" }, { "name": "RHSA-2005:016", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-016.html" }, { "name": "oval:org.mitre.oval:def:10228", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10228" }, { "name": "RHSA-2005:043", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-043.html" }, { "name": "SSRT4743", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=112861397904255\u0026w=2" }, { "name": "HPSBTU01210", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=112861397904255\u0026w=2" }, { "name": "57746", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1" }, { "name": "oval:org.mitre.oval:def:596", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A596" }, { "name": "101658", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1" }, { "name": "SCOSA-2006.4", "tags": [ "vendor-advisory", "x_refsource_SCO" ], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4/SCOSA-2006.4.txt" }, { "name": "SSRT4884", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=112861397904255\u0026w=2" }, { "name": "18317", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18317" }, { "name": "FLSA:157459-1", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.securityfocus.com/archive/1/428028/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:464", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A464" }, { "name": "oval:org.mitre.oval:def:726", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A726" }, { "name": "oval:org.mitre.oval:def:688", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A688" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en" }, { "name": "19", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/19" }, { "name": "57", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/57" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0791", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the \"ICMP Source Quench attack.\" NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:1112", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1112" }, { "name": "oval:org.mitre.oval:def:184", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A184" }, { "name": "13124", "refsource": "BID", "url": "http://www.securityfocus.com/bid/13124" }, { "name": "HPSBUX01164", "refsource": "HP", "url": "http://www.securityfocus.com/archive/1/418882/100/0/threaded" }, { "name": "RHSA-2005:017", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-017.html" }, { "name": "http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html", "refsource": "MISC", "url": "http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html" }, { "name": "FLSA:157459-2", "refsource": "FEDORA", "url": "http://www.securityfocus.com/archive/1/428058/100/0/threaded" }, { "name": "RHSA-2005:016", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-016.html" }, { "name": "oval:org.mitre.oval:def:10228", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10228" }, { "name": "RHSA-2005:043", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-043.html" }, { "name": "SSRT4743", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=112861397904255\u0026w=2" }, { "name": "HPSBTU01210", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=112861397904255\u0026w=2" }, { "name": "57746", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1" }, { "name": "oval:org.mitre.oval:def:596", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A596" }, { "name": "101658", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1" }, { "name": "SCOSA-2006.4", "refsource": "SCO", "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4/SCOSA-2006.4.txt" }, { "name": "SSRT4884", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=112861397904255\u0026w=2" }, { "name": "18317", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18317" }, { "name": "FLSA:157459-1", "refsource": "FEDORA", "url": "http://www.securityfocus.com/archive/1/428028/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:464", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A464" }, { "name": "oval:org.mitre.oval:def:726", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A726" }, { "name": "oval:org.mitre.oval:def:688", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A688" }, { "name": "http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en", "refsource": "MISC", "url": "http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en" }, { "name": "19", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/19" }, { "name": "57", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/57" }, { "name": "http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt", "refsource": "MISC", "url": "http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0791", "datePublished": "2005-04-13T04:00:00", "dateReserved": "2004-08-17T00:00:00", "dateUpdated": "2024-08-08T00:31:47.561Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2004-0791\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-04-12T04:00:00.000\",\"lastModified\":\"2024-11-20T23:49:25.053\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the \\\"ICMP Source Quench attack.\\\" NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"A711CDC2-412C-499D-9FA6-7F25B06267C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"7BF232A9-9E0A-481E-918D-65FC82EF36D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08003947-A4F1-44AC-84C6-9F8D097EB759\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2475113-CFE4-41C8-A86F-F2DA6548D224\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4/SCOSA-2006.4.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=112861397904255\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=112861397904255\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=112861397904255\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/18317\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securityreason.com/securityalert/19\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securityreason.com/securityalert/57\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-016.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-017.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-043.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/418882/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/428028/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/428058/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/13124\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10228\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1112\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A184\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A464\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A596\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A688\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A726\",\"source\":\"cve@mitre.org\"},{\"url\":\"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4/SCOSA-2006.4.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=112861397904255\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=112861397904255\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=112861397904255\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/18317\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securityreason.com/securityalert/19\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securityreason.com/securityalert/57\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-016.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-017.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-043.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/418882/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/428028/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/428058/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/13124\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10228\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1112\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A184\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A464\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A596\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A688\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A726\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
ghsa-fqvv-84gm-c2c5
Vulnerability from github
Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.
{ "affected": [], "aliases": [ "CVE-2004-0791" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-04-12T04:00:00Z", "severity": "MODERATE" }, "details": "Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the \"ICMP Source Quench attack.\" NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.", "id": "GHSA-fqvv-84gm-c2c5", "modified": "2022-05-03T03:13:10Z", "published": "2022-05-03T03:13:10Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0791" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10228" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1112" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A184" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A464" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A596" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A688" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A726" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq\u0026m=112861397904255\u0026w=2" }, { "type": "WEB", "url": "http://secunia.com/advisories/18317" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/19" }, { "type": "WEB", "url": "http://securityreason.com/securityalert/57" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1" }, { "type": "WEB", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1" }, { "type": "WEB", "url": "http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-016.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-017.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-043.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/418882/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/428028/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/428058/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/13124" }, { "type": "WEB", "url": "http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en" }, { "type": "WEB", "url": "http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt" } ], "schema_version": "1.4.0", "severity": [] }
rhsa-2005_017
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues in Red Hat\nEnterprise Linux 2.1 are now available.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThis advisory includes fixes for the following security issues:\n\niSEC Security Research discovered a VMA handling flaw in the uselib(2)\nsystem call of the Linux kernel. A local user could make use of this\nflaw to gain elevated (root) privileges. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CAN-2004-1235 to\nthis issue.\n\niSEC Security Research discovered a flaw in the page fault handler code\nthat could lead to local users gaining elevated (root) privileges on\nmultiprocessor machines. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2005-0001 to this issue.\n\nA flaw was discovered where an executable could cause a VMA overlap leading\nto a crash. On Itanium systems, a local user could trigger this flaw by\ncreating a carefully crafted ELF binary. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CAN-2005-0003 to\nthis issue.\n\niSEC Security Research and Georgi Guninski independently discovered a flaw\nin the scm_send function in the auxiliary message layer. A local user\ncould create a carefully crafted auxiliary message which could cause a\ndenial of service (system hang). The Common Vulnerabilities and Exposures\nproject (cve.mitre.org) has assigned the name CAN-2004-1016 to this issue.\n\nKirill Korotaev found a flaw in load_elf_binary affecting kernels prior to\n2.4.26. A local user could create a carefully crafted binary in such a\nway that it would cause a denial of service (system crash). The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the\nname CAN-2004-1234 to this issue.\n\nThese packages also fix issues in the io_edgeport driver (CAN-2004-1017), a\nmemory leak in ip_options_get (CAN-2004-1335), and missing VM_IO\nflags in some drivers (CAN-2004-1057).\n\nOlaf Kirch discovered that the recent security fixes for cmsg_len handling\n(CAN-2004-1016) broke 32-bit compatibility on 64-bit platforms. A patch to\ncorrect this issue is included.\n\nA recent Internet Draft by Fernando Gont recommended that ICMP Source\nQuench messages be ignored by hosts. A patch to ignore these messages is\nincluded.\n\nAll Red Hat Enterprise Linux 2.1 users running Itanium are advised to\nupgrade their kernels to the packages listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:017", "url": "https://access.redhat.com/errata/RHSA-2005:017" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?m=109503896031720", "url": "http://marc.theaimsgroup.com/?m=109503896031720" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0019-scm.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0019-scm.txt" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0021-uselib.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0021-uselib.txt" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0022-pagefault.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0022-pagefault.txt" }, { "category": "external", "summary": "137822", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137822" }, { "category": "external", "summary": "142596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142596" }, { "category": "external", "summary": "142731", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142731" }, { "category": "external", "summary": "142735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142735" }, { "category": "external", "summary": "143379", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=143379" }, { "category": "external", "summary": "144108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144108" }, { "category": "external", "summary": "144138", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144138" }, { "category": "external", "summary": "144408", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144408" }, { "category": "external", "summary": "144785", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144785" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_017.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-21T23:27:40+00:00", "generator": { "date": "2024-11-21T23:27:40+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2005:017", "initial_release_date": "2005-01-21T15:41:00+00:00", "revision_history": [ { "date": "2005-01-21T15:41:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-01-21T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:27:40+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0791", "discovery_date": "2004-09-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617291" } ], "notes": [ { "category": "description", "text": "Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the \"ICMP Source Quench attack.\" NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0791" }, { "category": "external", "summary": "RHBZ#1617291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0791", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0791" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0791", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0791" } ], "release_date": "2005-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-1016", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617350" } ], "notes": [ { "category": "description", "text": "The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1016" }, { "category": "external", "summary": "RHBZ#1617350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617350" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1016", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1016" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1016", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1016" } ], "release_date": "2004-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1017", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617351" } ], "notes": [ { "category": "description", "text": "Multiple \"overflows\" in the io_edgeport driver for Linux kernel 2.4.x have unknown impact and unknown attack vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1017" }, { "category": "external", "summary": "RHBZ#1617351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617351" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1017", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1017" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1017", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1017" } ], "release_date": "2004-11-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-1057", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617359" } ], "notes": [ { "category": "description", "text": "Multiple drivers in Linux kernel 2.4.19 and earlier do not properly mark memory with the VM_IO flag, which causes incorrect reference counts and may lead to a denial of service (kernel panic) when accessing freed kernel pages.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1057" }, { "category": "external", "summary": "RHBZ#1617359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617359" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1057", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1057" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1057", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1057" } ], "release_date": "2005-01-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-1234", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617396" } ], "notes": [ { "category": "description", "text": "load_elf_binary in Linux before 2.4.26 allows local users to cause a denial of service (system crash) via an ELF binary in which the interpreter is NULL.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1234" }, { "category": "external", "summary": "RHBZ#1617396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617396" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1234", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1234" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1234", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1234" } ], "release_date": "2004-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1235", "discovery_date": "2004-12-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617397" } ], "notes": [ { "category": "description", "text": "Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1235" }, { "category": "external", "summary": "RHBZ#1617397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617397" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1235", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1235" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1235", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1235" } ], "release_date": "2005-01-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1335", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617408" } ], "notes": [ { "category": "description", "text": "Memory leak in the ip_options_get function in the Linux kernel before 2.6.10 allows local users to cause a denial of service (memory consumption) by repeatedly calling the ip_cmsg_send function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1335" }, { "category": "external", "summary": "RHBZ#1617408", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617408" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1335", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1335" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1335", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1335" } ], "release_date": "2004-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0001", "discovery_date": "2005-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617429" } ], "notes": [ { "category": "description", "text": "Race condition in the page fault handler (fault.c) for Linux kernel 2.2.x to 2.2.7, 2.4 to 2.4.29, and 2.6 to 2.6.10, when running on multiprocessor machines, allows local users to execute arbitrary code via concurrent threads that share the same virtual memory space and simultaneously request stack expansion.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0001" }, { "category": "external", "summary": "RHBZ#1617429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617429" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0001", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0001" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0001", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0001" } ], "release_date": "2005-01-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0003", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617430" } ], "notes": [ { "category": "description", "text": "The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0003" }, { "category": "external", "summary": "RHBZ#1617430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617430" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0003", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0003" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0003", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0003" } ], "release_date": "2004-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:41:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:017" } ], "title": "security flaw" } ] }
rhsa-2005_043
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues in Red Hat\nEnterprise Linux 3 are now available.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThis advisory includes fixes for several security issues:\n\niSEC Security Research discovered a VMA handling flaw in the uselib(2)\nsystem call of the Linux kernel. A local user could make use of this\nflaw to gain elevated (root) privileges. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CAN-2004-1235 to\nthis issue.\n\nA flaw was discovered where an executable could cause a VMA overlap leading\nto a crash. A local user could trigger this flaw by creating a carefully\ncrafted a.out binary on 32-bit systems or a carefully crafted ELF binary\non Itanium systems. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2005-0003 to this issue.\n\niSEC Security Research discovered a flaw in the page fault handler code\nthat could lead to local users gaining elevated (root) privileges on\nmultiprocessor machines. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2005-0001 to this issue. A patch\nthat coincidentally fixed this issue was committed to the Update 4 kernel\nrelease in December 2004. Therefore Red Hat Enterprise Linux 3 kernels\nprovided by RHBA-2004:550 and subsequent updates are not vulnerable to\nthis issue.\n\nA flaw in the system call filtering code in the audit subsystem included\nin Red Hat Enterprise Linux 3 allowed a local user to cause a crash when\nauditing was enabled. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2004-1237 to this issue.\n\nOlaf Kirch discovered that the recent security fixes for cmsg_len handling\n(CAN-2004-1016) broke 32-bit compatibility on 64-bit platforms such as\nAMD64 and Intel EM64T. A patch to correct this issue is included.\n\nA recent Internet Draft by Fernando Gont recommended that ICMP Source\nQuench messages be ignored by hosts. A patch to ignore these messages is\nincluded.\n\nNote: The kernel-unsupported package contains various drivers and modules\nthat are unsupported and therefore might contain security problems that\nhave not been addressed.\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:043", "url": "https://access.redhat.com/errata/RHSA-2005:043" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?m=109503896031720", "url": "http://marc.theaimsgroup.com/?m=109503896031720" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0021-uselib.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0021-uselib.txt" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0022-pagefault.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0022-pagefault.txt" }, { "category": "external", "summary": "132245", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=132245" }, { "category": "external", "summary": "141996", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=141996" }, { "category": "external", "summary": "142091", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142091" }, { "category": "external", "summary": "142442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142442" }, { "category": "external", "summary": "143866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=143866" }, { "category": "external", "summary": "144048", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144048" }, { "category": "external", "summary": "144134", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144134" }, { "category": "external", "summary": "144784", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144784" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_043.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-21T23:27:44+00:00", "generator": { "date": "2024-11-21T23:27:44+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2005:043", "initial_release_date": "2005-01-18T23:52:00+00:00", "revision_history": [ { "date": "2005-01-18T23:52:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-01-18T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:27:44+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-smp-0:2.4.21-27.0.2.EL.i686", "product": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.i686", "product_id": "kernel-smp-0:2.4.21-27.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-27.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.i686", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.i686", "product_id": "kernel-0:2.4.21-27.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "product": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "product_id": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-unsupported@2.4.21-27.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "product": { "name": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "product_id": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.4.21-27.0.2.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "product": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "product_id": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-27.0.2.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-smp-0:2.4.21-27.0.2.EL.athlon", "product": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.athlon", "product_id": "kernel-smp-0:2.4.21-27.0.2.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-27.0.2.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.athlon", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.athlon", "product_id": "kernel-0:2.4.21-27.0.2.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "product": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "product_id": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-27.0.2.EL?arch=athlon" } } } ], "category": "architecture", "name": "athlon" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.2.EL.i386", "product": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.i386", "product_id": "kernel-doc-0:2.4.21-27.0.2.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.2.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "product": { "name": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "product_id": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-BOOT@2.4.21-27.0.2.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.2.EL.i386", "product": { "name": "kernel-source-0:2.4.21-27.0.2.EL.i386", "product_id": "kernel-source-0:2.4.21-27.0.2.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.2.EL?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "product": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "product_id": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-27.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "product": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "product_id": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.x86_64", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.x86_64", "product_id": "kernel-0:2.4.21-27.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.2.EL.x86_64", "product": { "name": "kernel-source-0:2.4.21-27.0.2.EL.x86_64", "product_id": "kernel-source-0:2.4.21-27.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.2.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "product": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "product_id": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-27.0.2.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.ia32e", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.ia32e", "product_id": "kernel-0:2.4.21-27.0.2.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=ia32e" } } } ], "category": "architecture", "name": "ia32e" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.2.EL.ia64", "product": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ia64", "product_id": "kernel-doc-0:2.4.21-27.0.2.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.2.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.ia64", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.ia64", "product_id": "kernel-0:2.4.21-27.0.2.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.2.EL.ia64", "product": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ia64", "product_id": "kernel-source-0:2.4.21-27.0.2.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.2.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.src", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.src", "product_id": "kernel-0:2.4.21-27.0.2.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390x", "product": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390x", "product_id": "kernel-doc-0:2.4.21-27.0.2.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.2.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.s390x", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.s390x", "product_id": "kernel-0:2.4.21-27.0.2.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.2.EL.s390x", "product": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390x", "product_id": "kernel-source-0:2.4.21-27.0.2.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.2.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390", "product": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390", "product_id": "kernel-doc-0:2.4.21-27.0.2.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.2.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.s390", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.s390", "product_id": "kernel-0:2.4.21-27.0.2.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.2.EL.s390", "product": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390", "product_id": "kernel-source-0:2.4.21-27.0.2.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.2.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "product_id": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=ppc64pseries" } } } ], "category": "architecture", "name": "ppc64pseries" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "product": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "product_id": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-27.0.2.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "product": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "product_id": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-27.0.2.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "product": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "product_id": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-27.0.2.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "product_id": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-27.0.2.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-27.0.2.EL.ppc64", "product": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ppc64", "product_id": "kernel-source-0:2.4.21-27.0.2.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-27.0.2.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.src" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0791", "discovery_date": "2004-09-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617291" } ], "notes": [ { "category": "description", "text": "Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the \"ICMP Source Quench attack.\" NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0791" }, { "category": "external", "summary": "RHBZ#1617291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0791", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0791" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0791", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0791" } ], "release_date": "2005-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-18T23:52:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:043" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-1074", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617367" } ], "notes": [ { "category": "description", "text": "The binfmt functionality in the Linux kernel, when \"memory overcommit\" is enabled, allows local users to cause a denial of service (kernel oops) via a malformed a.out binary.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1074" }, { "category": "external", "summary": "RHBZ#1617367", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617367" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1074", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1074" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1074", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1074" } ], "release_date": "2004-11-11T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-18T23:52:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:043" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1235", "discovery_date": "2004-12-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617397" } ], "notes": [ { "category": "description", "text": "Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1235" }, { "category": "external", "summary": "RHBZ#1617397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617397" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1235", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1235" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1235", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1235" } ], "release_date": "2005-01-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-18T23:52:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:043" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1237", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617399" } ], "notes": [ { "category": "description", "text": "Unknown vulnerability in the system call filtering code in the audit subsystem for Red Hat Enterprise Linux 3 allows local users to cause a denial of service (system crash) via unknown vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1237" }, { "category": "external", "summary": "RHBZ#1617399", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617399" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1237", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1237" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1237", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1237" } ], "release_date": "2004-09-10T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-18T23:52:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:043" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0003", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617430" } ], "notes": [ { "category": "description", "text": "The 64 bit ELF support in Linux kernel 2.6 before 2.6.10, on 64-bit architectures, does not properly check for overlapping VMA (virtual memory address) allocations, which allows local users to cause a denial of service (system crash) or execute arbitrary code via a crafted ELF or a.out file.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0003" }, { "category": "external", "summary": "RHBZ#1617430", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617430" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0003", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0003" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0003", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0003" } ], "release_date": "2004-12-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-18T23:52:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-0:2.4.21-27.0.2.EL.src", "3AS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-0:2.4.21-27.0.2.EL.src", "3Desktop:kernel-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.i386", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-0:2.4.21-27.0.2.EL.src", "3ES:kernel-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.i386", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-0:2.4.21-27.0.2.EL.src", "3WS:kernel-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-doc-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.i386", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.ppc64", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-source-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-source-0:2.4.21-27.0.2.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.i686", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-27.0.2.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:043" } ], "title": "security flaw" } ] }
rhsa-2005_016
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages that fix several security issues in Red Hat\nEnterprise Linux 2.1 are now available.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThis advisory includes fixes for the following security issues:\n\niSEC Security Research discovered a VMA handling flaw in the uselib(2)\nsystem call of the Linux kernel. A local user could make use of this\nflaw to gain elevated (root) privileges. The Common Vulnerabilities and\nExposures project (cve.mitre.org) has assigned the name CAN-2004-1235 to\nthis issue.\n\niSEC Security Research discovered a flaw in the page fault handler code\nthat could lead to local users gaining elevated (root) privileges on\nmultiprocessor machines. The Common Vulnerabilities and Exposures project\n(cve.mitre.org) has assigned the name CAN-2005-0001 to this issue. \n\niSEC Security Research and Georgi Guninski independently discovered a flaw\nin the scm_send function in the auxiliary message layer. A local user\ncould create a carefully crafted auxiliary message which could cause a\ndenial of service (system hang). The Common Vulnerabilities and Exposures\nproject (cve.mitre.org) has assigned the name CAN-2004-1016 to this issue.\n\nKirill Korotaev found a flaw in load_elf_binary affecting kernels prior to\n2.4.26. A local user could create a carefully crafted binary in such a\nway that it would cause a denial of service (system crash). The Common\nVulnerabilities and Exposures project (cve.mitre.org) has assigned the\nname CAN-2004-1234 to this issue.\n\nThese packages also fix issues in the io_edgeport driver (CAN-2004-1017), a\nmemory leak in ip_options_get (CAN-2004-1335), and missing VM_IO\nflags in some drivers (CAN-2004-1057).\n\nA recent Internet Draft by Fernando Gont recommended that ICMP Source\nQuench messages be ignored by hosts. A patch to ignore these messages is\nincluded.\n\nAll Red Hat Enterprise Linux 2.1 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:016", "url": "https://access.redhat.com/errata/RHSA-2005:016" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0022-pagefault.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0022-pagefault.txt" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0021-uselib.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0021-uselib.txt" }, { "category": "external", "summary": "http://www.isec.pl/vulnerabilities/isec-0019-scm.txt", "url": "http://www.isec.pl/vulnerabilities/isec-0019-scm.txt" }, { "category": "external", "summary": "http://marc.theaimsgroup.com/?m=109503896031720", "url": "http://marc.theaimsgroup.com/?m=109503896031720" }, { "category": "external", "summary": "137821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137821" }, { "category": "external", "summary": "142594", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142594" }, { "category": "external", "summary": "142730", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142730" }, { "category": "external", "summary": "142734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142734" }, { "category": "external", "summary": "143378", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=143378" }, { "category": "external", "summary": "144137", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144137" }, { "category": "external", "summary": "144407", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144407" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_016.json" } ], "title": "Red Hat Security Advisory: kernel security update", "tracking": { "current_release_date": "2024-11-21T23:27:36+00:00", "generator": { "date": "2024-11-21T23:27:36+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2005:016", "initial_release_date": "2005-01-21T15:37:00+00:00", "revision_history": [ { "date": "2005-01-21T15:37:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-01-21T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T23:27:36+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "Red Hat Enterprise Linux ES version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "Red Hat Enterprise Linux WS version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-0791", "discovery_date": "2004-09-20T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617291" } ], "notes": [ { "category": "description", "text": "Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the \"ICMP Source Quench attack.\" NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-0791" }, { "category": "external", "summary": "RHBZ#1617291", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617291" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-0791", "url": "https://www.cve.org/CVERecord?id=CVE-2004-0791" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-0791", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-0791" } ], "release_date": "2005-04-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:016" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2004-1016", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617350" } ], "notes": [ { "category": "description", "text": "The scm_send function in the scm layer for Linux kernel 2.4.x up to 2.4.28, and 2.6.x up to 2.6.9, allows local users to cause a denial of service (system hang) via crafted auxiliary messages that are passed to the sendmsg function, which causes a deadlock condition.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1016" }, { "category": "external", "summary": "RHBZ#1617350", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617350" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1016", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1016" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1016", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1016" } ], "release_date": "2004-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:016" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1017", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617351" } ], "notes": [ { "category": "description", "text": "Multiple \"overflows\" in the io_edgeport driver for Linux kernel 2.4.x have unknown impact and unknown attack vectors.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1017" }, { "category": "external", "summary": "RHBZ#1617351", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617351" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1017", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1017" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1017", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1017" } ], "release_date": "2004-11-26T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:016" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-1057", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617359" } ], "notes": [ { "category": "description", "text": "Multiple drivers in Linux kernel 2.4.19 and earlier do not properly mark memory with the VM_IO flag, which causes incorrect reference counts and may lead to a denial of service (kernel panic) when accessing freed kernel pages.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1057" }, { "category": "external", "summary": "RHBZ#1617359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617359" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1057", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1057" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1057", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1057" } ], "release_date": "2005-01-07T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:016" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2004-1234", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617396" } ], "notes": [ { "category": "description", "text": "load_elf_binary in Linux before 2.4.26 allows local users to cause a denial of service (system crash) via an ELF binary in which the interpreter is NULL.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1234" }, { "category": "external", "summary": "RHBZ#1617396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617396" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1234", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1234" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1234", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1234" } ], "release_date": "2004-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:016" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1235", "discovery_date": "2004-12-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617397" } ], "notes": [ { "category": "description", "text": "Race condition in the (1) load_elf_library and (2) binfmt_aout function calls for uselib in Linux kernel 2.4 through 2.429-rc2 and 2.6 through 2.6.10 allows local users to execute arbitrary code by manipulating the VMA descriptor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1235" }, { "category": "external", "summary": "RHBZ#1617397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617397" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1235", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1235" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1235", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1235" } ], "release_date": "2005-01-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:016" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2004-1335", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617408" } ], "notes": [ { "category": "description", "text": "Memory leak in the ip_options_get function in the Linux kernel before 2.6.10 allows local users to cause a denial of service (memory consumption) by repeatedly calling the ip_cmsg_send function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-1335" }, { "category": "external", "summary": "RHBZ#1617408", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617408" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-1335", "url": "https://www.cve.org/CVERecord?id=CVE-2004-1335" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-1335", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-1335" } ], "release_date": "2004-12-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:016" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-0001", "discovery_date": "2005-01-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617429" } ], "notes": [ { "category": "description", "text": "Race condition in the page fault handler (fault.c) for Linux kernel 2.2.x to 2.2.7, 2.4 to 2.4.29, and 2.6 to 2.6.10, when running on multiprocessor machines, allows local users to execute arbitrary code via concurrent threads that share the same virtual memory space and simultaneously request stack expansion.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0001" }, { "category": "external", "summary": "RHBZ#1617429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617429" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0001", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0001" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0001", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0001" } ], "release_date": "2005-01-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-01-21T15:37:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:016" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" } ] }
gsd-2004-0791
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2004-0791", "description": "Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the \"ICMP Source Quench attack.\" NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.", "id": "GSD-2004-0791", "references": [ "https://www.suse.com/security/cve/CVE-2004-0791.html", "https://access.redhat.com/errata/RHSA-2005:043", "https://access.redhat.com/errata/RHSA-2005:017", "https://access.redhat.com/errata/RHSA-2005:016", "https://packetstormsecurity.com/files/cve/CVE-2004-0791" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2004-0791" ], "details": "Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the \"ICMP Source Quench attack.\" NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities.", "id": "GSD-2004-0791", "modified": "2023-12-13T01:22:54.614288Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0791", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the \"ICMP Source Quench attack.\" NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "oval:org.mitre.oval:def:1112", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1112" }, { "name": "oval:org.mitre.oval:def:184", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A184" }, { "name": "13124", "refsource": "BID", "url": "http://www.securityfocus.com/bid/13124" }, { "name": "HPSBUX01164", "refsource": "HP", "url": "http://www.securityfocus.com/archive/1/418882/100/0/threaded" }, { "name": "RHSA-2005:017", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-017.html" }, { "name": "http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html", "refsource": "MISC", "url": "http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html" }, { "name": "FLSA:157459-2", "refsource": "FEDORA", "url": "http://www.securityfocus.com/archive/1/428058/100/0/threaded" }, { "name": "RHSA-2005:016", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-016.html" }, { "name": "oval:org.mitre.oval:def:10228", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10228" }, { "name": "RHSA-2005:043", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-043.html" }, { "name": "SSRT4743", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=112861397904255\u0026w=2" }, { "name": "HPSBTU01210", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=112861397904255\u0026w=2" }, { "name": "57746", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1" }, { "name": "oval:org.mitre.oval:def:596", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A596" }, { "name": "101658", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1" }, { "name": "SCOSA-2006.4", "refsource": "SCO", "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4/SCOSA-2006.4.txt" }, { "name": "SSRT4884", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=112861397904255\u0026w=2" }, { "name": "18317", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18317" }, { "name": "FLSA:157459-1", "refsource": "FEDORA", "url": "http://www.securityfocus.com/archive/1/428028/100/0/threaded" }, { "name": "oval:org.mitre.oval:def:464", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A464" }, { "name": "oval:org.mitre.oval:def:726", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A726" }, { "name": "oval:org.mitre.oval:def:688", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A688" }, { "name": "http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en", "refsource": "MISC", "url": "http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en" }, { "name": "19", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/19" }, { "name": "57", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/57" }, { "name": "http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt", "refsource": "MISC", "url": "http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:solaris:10.0:*:sparc:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0791" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the \"ICMP Source Quench attack.\" NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt", "refsource": "MISC", "tags": [], "url": "http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt" }, { "name": "http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en" }, { "name": "http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html", "refsource": "MISC", "tags": [], "url": "http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html" }, { "name": "57746", "refsource": "SUNALERT", "tags": [ "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1" }, { "name": "SCOSA-2006.4", "refsource": "SCO", "tags": [], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4/SCOSA-2006.4.txt" }, { "name": "18317", "refsource": "SECUNIA", "tags": [], "url": "http://secunia.com/advisories/18317" }, { "name": "RHSA-2005:016", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-016.html" }, { "name": "RHSA-2005:017", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-017.html" }, { "name": "RHSA-2005:043", "refsource": "REDHAT", "tags": [], "url": "http://www.redhat.com/support/errata/RHSA-2005-043.html" }, { "name": "101658", "refsource": "SUNALERT", "tags": [], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1" }, { "name": "13124", "refsource": "BID", "tags": [], "url": "http://www.securityfocus.com/bid/13124" }, { "name": "19", "refsource": "SREASON", "tags": [], "url": "http://securityreason.com/securityalert/19" }, { "name": "57", "refsource": "SREASON", "tags": [], "url": "http://securityreason.com/securityalert/57" }, { "name": "SSRT4743", "refsource": "HP", "tags": [], "url": "http://marc.info/?l=bugtraq\u0026m=112861397904255\u0026w=2" }, { "name": "oval:org.mitre.oval:def:726", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A726" }, { "name": "oval:org.mitre.oval:def:688", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A688" }, { "name": "oval:org.mitre.oval:def:596", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A596" }, { "name": "oval:org.mitre.oval:def:464", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A464" }, { "name": "oval:org.mitre.oval:def:184", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A184" }, { "name": "oval:org.mitre.oval:def:1112", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1112" }, { "name": "oval:org.mitre.oval:def:10228", "refsource": "OVAL", "tags": [], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10228" }, { "name": "FLSA:157459-2", "refsource": "FEDORA", "tags": [], "url": "http://www.securityfocus.com/archive/1/428058/100/0/threaded" }, { "name": "FLSA:157459-1", "refsource": "FEDORA", "tags": [], "url": "http://www.securityfocus.com/archive/1/428028/100/0/threaded" }, { "name": "HPSBUX01164", "refsource": "HP", "tags": [], "url": "http://www.securityfocus.com/archive/1/418882/100/0/threaded" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false } }, "lastModifiedDate": "2018-10-30T16:26Z", "publishedDate": "2005-04-12T04:00Z" } } }
var-200504-0003
Vulnerability from variot
Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the "ICMP Source Quench attack." NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities. A vulnerability exists in the reliance of the Border Gateway Protocol (BGP) on the Transmission Control Protocol (TCP) to maintain persistent sessions. Sustained exploitation of this vulnerability could lead to a denial-of-service condition affecting a large segment of the Internet community. Normal operations would most likely resume shortly after the attack stopped. In multiple vendor products TCP The implementation of ICMP Included in error message IP Address and TCP There is a flaw that only validates the port and does not check that the sequence number is in the proper range. This ICMP source quench Established by processing error messages TCP There is a vulnerability that reduces connection throughput. The vulnerability is ICMP Vulnerabilities resulting from message processing (CVE-2004-0790, CVE-2004-0791, CVE-2004-1060) Out of CVE-2004-0791 Vulnerability published as. TCP Due to vulnerabilities that affect implementation, a wide range of products are affected by these vulnerabilities. For more information, NISCC-532967 (JVN) , NISCC Advisory 532967/NISCC/ICMP (CPNI Advisory 00303) Please check also.Intentionally created fraud ICMP By processing error messages TCP Connection is reset, resulting in service disruption (DoS) It can cause a condition. Multiple vendor implementations of TCP/IP Internet Control Message Protocol (ICMP) are reported prone to several denial-of-service attacks. ICMP is employed by network nodes to determine certain automatic actions to take based on network failures reported by an ICMP message. Reportedly, the RFC doesn't recommend security checks for ICMP error messages. As long as an ICMP message contains a valid source and destination IP address and port pair, it will be accepted for an associated connection. The following individual attacks are reported: - A blind connection-reset attack. This attack takes advantage of the specification that describes that on receiving a 'hard' ICMP error, the corresponding connection should be aborted. The Mitre ID CAN-2004-0790 is assigned to this issue. A remote attacker may exploit this issue to terminate target TCP connections and deny service for legitimate users. - An ICMP Source Quench attack. The Mitre ID CAN-2004-0791 is assigned to this issue. A remote attacker may exploit this issue to degrade the performance of TCP connections and partially deny service for legitimate users. - An attack against ICMP PMTUD is reported to affect multiple vendors when they are configured to employ PMTUD. By sending a suitable forged ICMP message to a target host, an attacker may reduce the MTU for a given connection. The Mitre ID CAN-2004-1060 is assigned to this issue. A remote attacker may exploit this issue to degrade the performance of TCP connections and partially deny service for legitimate users. **Update: Microsoft platforms are also reported prone to these issues. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1
HP SECURITY BULLETIN
HPSBUX01164 REVISION: 4
SSRT4884 rev.4 - HP-UX TCP/IP Remote Denial of Service (DoS)
NOTICE: There are no restrictions for distribution of this Security Bulletin provided that it remains complete and intact.
The information in this Security Bulletin should be acted upon as soon as possible.
INITIAL RELEASE: 10 July 2005
POTENTIAL SECURITY IMPACT: Remote Denial of Service (DoS)
SOURCE: Hewlett-Packard Company HP Software Security Response Team
VULNERABILITY SUMMARY: A potential security vulnerability has been identified with HP-UX running TCP/IP. This vulnerability could be remotely exploited by an unauthorized user to cause a Denial of Service(DoS).
REFERENCES: NISCC VU#532967, CAN-2004-0790, CAN-2004-0791, CAN-2004-1060
SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. HP-UX B.11.00, B.11.04, B.11.11, B.11.22, B.11.23 running TCP/IP. HP-UX B.11.11 and B.11.23 running TOUR (Transport Optional Upgrade Release).
BACKGROUND:
AFFECTED VERSIONS
HP-UX B.11.22
HP-UX B.11.00
=============
Networking.NET2-KRN
action: set ip_pmtu_strategy= 0 and either install binary
files or filter ICMP
HP-UX B.11.11
=============
Networking.NET2-KRN
action: set ip_pmtu_strategy= 0 and install PHNE_33159
HP-UX B.11.23
=============
Networking.NET2-KRN
->action: set ip_pmtu_strategy= 0 and install PHNE_32606
HP-UX B.11.11
HP-UX B.11.23
=============
TOUR_PRODUCT.T-NET2-KRN
action: set ip_pmtu_strategy= 0 and filter ICMP
HP-UX B.11.04
=============
Networking.NET2-KRN
action: set ip_pmtu_strategy= 0 and filter ICMP
END AFFECTED VERSIONS
Note: The latest TOUR (Transport Optional Upgrade Release), version 2.4, is available on B.11.11 only. The latest Transport Functionality is available to B.11.23 customers in the HP-UX 11i v2 September 2004 release. Customers using TOUR on B.11.23 can apply the workaround (set ip_pmtu_strategy= 0 and filter ICMP) or upgrade to the HP-UX 11i v2 September 2004 release. After upgrading the action for B.11.23 Networking.NET2-KRN listed above should be implemented.
http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html? lang=en
There are three issues reported in NISCC VU#532967:
CVE number: CAN-2004-0790 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0790 CVE number: CAN-2004-0791 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0791 CVE number: CAN-2004-1060 http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1060
Workarounds are available for all three of these issues.
Until binary files are available for B.11.04 the workarounds should be used.
->Binary files are available for CAN-2004-0790 and CAN-2004-0791 for HP-UX B.11.00 and B.11.22.
Since PHNE_33159 is now available for B.11.11 the preliminary binary files for B.11.11 have been removed from the ftp site.
->Since PHNE_32606 is now available for B.11.23 the preliminary binary files for B.11.23 have been removed from the ftp site.
Note: If the TOUR (Transport Optional Upgrade Release) product is installed the binary files cannot be used.
Until the TOUR product is revised there are several options:
B.11.11 1. Use the workarounds. or 2. Remove TOUR and install the binary files.
B.11.23 1. Use the workarounds. or 2. Upgrade to the HP-UX 11i v2 September 2004 release and install the binary files.
TOUR(Transport Optional Upgrade Release) is available from http://www.hp.com/go/softwaredepot.
Workaround for CAN-2004-1060 may not be necessary.
Although changes in the binary files and patches for CAN-2004-0790 and CAN-2004-0791 do not prevent the exploit of CAN-2004-1060, they do make it less likely to succeed. The sequence number check suggested in section 5.1 of http://www.ietf.org/internet-drafts/ draft-gont-tcpm-icmp-attacks-03.txt has been implemented. Customers should consider whether this check reduces the risk of the exploit to the point that setting ip_pmtu_strategy=0 is not required.
If the workaround for CAN-2004-1060 is to be used, please note the following: ================================================= HPSBUX01137 recommends setting ip_pmtu_strategy = 0 or 3 as a workaround for the problem of CAN-2005-1192. CAN-2004-1060 has a different root cause and cannot be worked around with p_pmtu_strategy=3. To work around both CAN-2005-1192 and CAN-2004-1060 ip_pmtu_strategy=0 must be used.
Please refer to the Manual Actions section below for a summary of the required actions.
Workarounds:
CAN-2004-0790 and CAN-2004-0791
Filter out the following ICMP messages:
Type 3, Code 2 (Destination Unreachable, Protocol Unreachable)
Type 3, Code 3 (Destination Unreachable, Port Unreachable)
Type 4, Code 0 (Source Quench)
CAN-2004-1060
Set ip_pmtu_strategy=0.
Note: Filtering "Protocol Unreachable" and "Port Unreachable" should not be done without careful testing. Filtering these out may interfere with the correct functioning of network components. Filtering "Source Quench" should present little risk.
Setting ip_pmtu_strategy=0
Edit /etc/rc.config.d/nddconf to add the following:
TRANSPORT_NAME[n]=ip NDD_NAME[n]=ip_pmtu_strategy NDD_VALUE[n]=0
where 'n' is the next available index value as described in the nddconf comments.
This value will take effect when the system is rebooted. Until the system can be rebooted use the following command to read the /etc/rc.config.d/nddconf file and set the tunable parameters:
/usr/bin/ndd -c
The ip_pmtu_strategy parameter can be displayed by the following command:
/usr/bin/ndd -get /dev/ip ip_pmtu_strategy
Note: Since open connections will remain potentially vulnerable until they are closed and certain internal data structures are released it is recommended that the system be rebooted.
Note: There is a defect that will cause "ndd -c" to fail if there are more than 10 directives in /etc/rc.config.d/nddconf. That defect is fixed in the following patches:
B.11.11 - PHNE_25644 or subsequent
B.11.04 - PHNE_26076 or subsequent
B.11.00 - PHNE_26125 or subsequent
Preliminary binary files
->Preliminary binary files are available for B.11.00 and B.11.22. Patches are available for B.11.11 and B.11.23. The patches and the preliminary binary files address CAN-2004-0790 and CAN-2004-0791 only. Although changes in the patches and binary files for CAN-2004-0790 and CAN-2004-0791 do not prevent the exploit of CAN-2004-1060, they do make it less likely to succeed.
Instructions for downloading and installing the binary files are contained in readme files available here:
System: hprc.external.hp.com (192.170.19.51)
Login: icmp
Password: icmp
FTP Access:
ftp://icmp:icmp@hprc.external.hp.com/
or: ftp://icmp:icmp@192.170.19.51/
Note: The links above may not work for all browsers. If the
link fails the url should be entered directly into the
browser's address field.
Since a patch is available for B.11.11 the readme.11.11.txt and corresponding binary files have been removed from the ftp site.
->Since a patch is available for B.11.23 the readme.11.23.txt and corresponding binary files have been removed from the ftp site.
Download the appropriate readme file containing further instructions:
readme.11.00.txt readme.11.22.txt
Verify the cksum or md5sum:
->Note: The readme files have not changed since rev.1 of this Security Bulletin.
cksum readme* 2844254744 2546 readme.11.00.txt 2836317466 2469 readme.11.22.txt
md5sum readme* d28504f8532192de6a4f33bba4ea90ec readme.11.00.txt cafbb24f3dc7131501142f75deaeccbd readme.11.22.txt
Download and install the binary files as discussed in the readme files. The binary files are available in the same directory as the readme files.
For B.11.11 download and install PHNE_33159. The patch is available from < http://itrc.hp.com>.
->For B.11.23 download and install PHNE_32606. The patch is available from < http://itrc.hp.com>.
MANUAL ACTIONS: Yes - NonUpdate 1. Set ip_pmtu_strategy=0
-
EITHER a. Filter out the following ICMP messages:
Type 3, Code 2 (Destination Unreachable, Protocol Unreachable) Type 3, Code 3 (Destination Unreachable, Port Unreachable) Type 4, Code 0 (Source Quench)
OR
b. Install the appropriate binary file or patch (binary file
not available for B.11.04).
BULLETIN REVISION HISTORY: Revision 0: 25 May 2005 Initial release
Revision 1: 1 June 2005 Binary files for B.11.00 and B.11.22 are available. Added information about CAN-2004-1060. The "set ip_pmtu_strategy=0" workaround is required even if binary files are installed. Removed IPSec information.
Revision 2: 19 June 2005 TOUR (Transport Optional Upgrade Release) on B.11.11 and B.11.23 is potentially vulnerable. Added a description of the sequence number check implemented in the binary files.
Revision 3: 27 June 2005 PHNE_33159 is available for B.11.11. The B.11.11 binary files have been removed from the ftp site.
Revision 4: 10 July 2005 PHNE_32606 is available for B.11.23. The B.11.23 binary files have been removed from the ftp site.
HP-UX SPECIFIC SECURITY BULLETINS*: Security Patch Check revision B.02.00 analyzes all HP-issued Security Bulletins to provide a subset of recommended actions that potentially affect a specific HP-UX system.
For more information: http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/ displayProductInfo.pl?productNumber=B6834AA
SUPPORT: For further information, contact normal HP Services support channel.
REPORT: To report a potential security vulnerability with any HP supported product, send Email to: security-alert@hp.com. It is strongly recommended that security related information being communicated to HP be encrypted using PGP, especially exploit information. To obtain the security-alert PGP key please send an e-mail message to security-alert@hp.com with the Subject of 'get key' (no quotes).
SUBSCRIBE: To initiate a subscription to receive future HP Security Bulletins via Email:
http://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA& langcode=USENG&jumpid=in_SC-GEN__driverITRC&topiccode=ITRC
On the web page: ITRC security bulletins and patch sign-up Under Step1: your IRTC security bulletins and patches - check ALL categories for which alerts are required and continue. Under Step2: your IRTC operating systems - verify your operating system selections are checked and save.
To update an existing subscription: http://h30046.www3.hp.com/subSignIn.php
Log in on the web page Subscriber's choice for Business: sign-in. On the Web page: Subscriber's Choice: your profile summary - use Edit Profile to update appropriate sections.
To review previously published Security Bulletins visit: http://itrc.hp.com/service/cki/secBullArchive.do
- The Software Product Category that this Security Bulletin relates to is represented by the 5th and 6th characters of the Bulletin number: GN = HP General SW, MA = HP Management Agents, MI = Misc. 3rd party SW, MP = HP MPE/iX, NS = HP NonStop Servers, OV = HP OpenVMS, PI = HP Printing & Imaging, ST = HP Storage SW, TL = HP Trusted Linux, TU = HP Tru64 UNIX, UX = HP-UX, VV = HP Virtual Vault
System management and security procedures must be reviewed frequently to maintain system integrity. HP is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions.
"HP is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HP products the important security information contained in this Bulletin. HP recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HP does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HP will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HP disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement."
(c)Copyright 2005 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HP nor its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett-Packard Company and the names of Hewlett-Packard products referenced herein are trademarks of Hewlett-Packard Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners.
-----BEGIN PGP SIGNATURE----- Version: PGP 8.1
iQA/AwUBQtJVE+AfOvwtKn1ZEQKwPwCeLKNxE1048xGZniru4epJ6YAqYIcAn2+Y fjKXZ3hbnTeQeIn9Kk9ePC1d =cFE+ -----END PGP SIGNATURE-----
. HP Tru64 UNIX 5.1B-3 HP Tru64 UNIX 5.1B-2/PK4 HP Tru64 UNIX 5.1A PK HP Tru64 UNIX 4.0G PK4 HP Tru64 UNIX 4.0F PK8
BACKGROUND:
Special Instructions for the Customer
The Internet Control Message Protocol (ICMP) (RFC 792) is used in the Internet Architecture to perform fault-isolation and recovery (RFC816), which is the group of actions that hosts and routers take to determine if a network failure has occurred.
The industry standard TCP specification (RFC 793) has a vulnerability whereby ICMP packets can be used to perform a variety of attacks such as blind connection reset attacks and blind throughput-reduction attacks.
Path MTU Discovery (RFC 1191) describes a technique for dynamically discovering the MTU (maximum transmission unit) of an arbitrary internet path. This protocol uses ICMP packets from the router to discover the MTU for a TCP connection path.
HP has addressed these potential vulnerabilities by providing a new kernel tunable in Tru64 UNIX V5.1B and 5.1A, icmp_tcpseqcheck. In Tru64 4.0F and 4.0G, HP has introduced two new kernel tunables, icmp_tcpseqcheck and icmp_rejectcodemask. This behavior protects TCP against spoofed ICMP packets.
Set the tunable as follows:
icmp_tcpseqcheck=1 (default)
Provides a level of protection that reduces the possibility
of considering a spoofed ICMP packet as valid
to one in two raised to the thirty-second power.
icmp_tcpseqcheck=0
Retains existing behavior, i.e., accepts all ICMP packets
icmp_rejectcodemask
In the Requirements for IP Version 4 Routers (RFC 1812), research suggests that the use of ICMP Source Quench packets is an ineffective (and unfair) antidote for congestion. Thus, HP recommends completely ignoring ICMP Source Quench packets using the icmp_rejectcodemask tunable. The icmp_rejectcodemask is a bitmask that designates the ICMP codes that the system should reject. For example, to reject ICMP Source Quench packets, set the mask bit position for the ICMP_SOURCEQUENCH code 4, which is two to the 4th power = 16 (0x10 hex). The icmp_rejectcodemask tunable can be used to reject any ICMP packet type, or multiple masks can be combined to reject more than one type.
Note: the ICMP type codes are defined in "/usr/include/netinet/ip_icmp.h".
Set the tunable as follows:
icmp_rejectcodemask = 0x10
Rejects ICMP Source Quench packets
icmp_rejectcodemask = 0 (default)
Retains existing behavior, i.e., accepts all ICMP packets
Adjusting the variables
The ICMP sequence check variable (icmp_tcpseqcheck) can be adjusted using the sysconfig and sysconfigdb commands:
sysconfig -q inet icmp_tcpseqcheck
inet: icmp_tcpseqcheck = 1
sysconfig -r inet icmp_tcpseqcheck=0
icmp_tcpseqcheck: reconfigured
sysconfig -q inet icmp_tcpseqcheck
inet: icmp_tcpseqcheck = 0
sysconfig -q inet icmp_tcpseqcheck > /tmp/icmp_tcpseqcheck_merge
sysconfigdb -m -f /tmp/icmp_tcpseqcheck_merge inet
sysconfigdb -l inet
inet: icmp_tcpseqcheck = 1
Similarly, the icmp_rejectcodemask variable can be adjusted using the sysconfig and sysconfigdb commands:
sysconfig -q inet icmp_rejectcodemask
inet: icmp_rejectcodemask = 0
sysconfig -r inet icmp_rejectcodemask=0x10
icmp_rejectcodemask: reconfigured
sysconfig -q inet icmp_rejectcodemask
inet: icmp_rejectcodemask = 16
sysconfig -q inet icmp_rejectcodemask
/tmp/icmp_rejectcodemask_merge
sysconfigdb -m -f /tmp/icmp_rejectcodemask_merge inet
sysconfigdb -l inet
inet: icmp_rejectcodemask = 16
RESOLUTION:
Until the corrections are available in a mainstream release patch kit, HP is releasing the following Early Release Patch (ERP) kits publicly for use by any customer.
The ERP kits use dupatch to install and will not install over any installed Customer Specific Patches (CSPs) that have file intersections with the ERPs. Contact your service provider for assistance if the ERP installation is blocked by any of your installed CSPs.
The fixes contained in the ERP kits are scheduled to be available in the following mainstream patch kits:
HP Tru64 Unix 5.1B-4
Early Release Patches
The ERPs deliver the following file:
/sys/BINARY/inet.mod
HP Tru64 UNIX 5.1B-3 ERP Kit Name: T64KIT0025925-V51BB26-ES-20050628 Kit Location: http://www.itrc.hp.com/service/patch/patchDetail.do? patchid=T64KIT0025925-V51BB26-ES-20050628 MD5 checksum: 129251787a426320af16cd584b982027
HP Tru64 UNIX 5.1B-2/PK4 ERP Kit Name: T64KIT0025924-V51BB25-ES-20050628 Kit Location: http://www.itrc.hp.com/service/patch/patchDetail.do? patchid=T64KIT0025924-V51BB25-ES-20050628 MD5 checksum: 5fcc77a6876db6d10ef07ac96e11b3af
HP Tru64 UNIX 5.1A PK6 ERP Kit Name: T64KIT0025922-V51AB24-ES-20050628 Kit Location: http://www.itrc.hp.com/service/patch/patchDetail.do? patchid=T64KIT0025922-V51AB24-ES-20050628 MD5 checksum: 7c373b35c95945651a1cfda96bf71421
HP Tru64 UNIX 4.0G PK4 ERP Kit Name: T64KIT0025920-V40GB22-ES-20050628 Kit Location: http://www.itrc.hp.com/service/patch/patchDetail.do? patchid=T64KIT0025920-V40GB22-ES-20050628 MD5 checksum: 13849fd555239d75d300d1cb46dc995f
HP Tru64 UNIX 4.0F PK8 ERP Kit Name: DUXKIT0025921-V40FB22-ES-20050628 Kit Location: http://www.itrc.hp.com/service/patch/patchDetail.do? patchid=T64KIT0025920-V40GB22-ES-20050628 MD5 checksum: 743b614d39f185802701b7f2dd14ffa5
MD5 checksums are available from the ITRC patch database main page: http://www.itrc.hp.com/service/patch/mainPage.do - From the patch database main page, click Tru64 UNIX, then click verifying MD5 checksums under useful links.
Want a new IT Security job?
Vacant positions at Secunia: http://secunia.com/secunia_vacancies/
TITLE: Cisco Various Products ICMP Message Handling Denial of Service
SECUNIA ADVISORY ID: SA14904
VERIFY ADVISORY: http://secunia.com/advisories/14904/
CRITICAL: Less critical
IMPACT: DoS
WHERE:
From remote
OPERATING SYSTEM: Cisco Content Services Switch 11000 Series (WebNS) http://secunia.com/product/1507/ Cisco Global Site Selector (GSS) 4480 1.x http://secunia.com/product/2270/ Cisco IOS 10.x http://secunia.com/product/184/ Cisco IOS 11.x http://secunia.com/product/183/ Cisco IOS 12.x http://secunia.com/product/182/ Cisco IOS R11.x http://secunia.com/product/53/ Cisco IOS R12.x http://secunia.com/product/50/ Cisco IOS XR (CRS-1) 3.x http://secunia.com/product/4907/ Cisco ONS 15000 Series http://secunia.com/product/684/ Cisco PIX 6.x http://secunia.com/product/56/ Cisco SAN-OS 1.x (MDS 9000 Switches) http://secunia.com/product/3214/
DESCRIPTION: Fernando Gont has published an Internet-Draft describing how ICMP (Internet Control Message Protocol) can be exploited by malicious people to cause a DoS (Denial of Service). Cisco has acknowledged that various Cisco products are affected.
The published Internet-Draft details three types of attacks, which utilize the following ICMP messages to cause a negative impact on TCP connections either terminating or originating from a vulnerable device.
SOLUTION: See patch matrix in vendor advisory for information about fixes. http://www.cisco.com/warp/public/707/cisco-sa-20050412-icmp.shtml#software
PROVIDED AND/OR DISCOVERED BY: Fernando Gont
ORIGINAL ADVISORY: Cisco: http://www.cisco.com/warp/public/707/cisco-sa-20050412-icmp.shtml
NISCC: http://www.niscc.gov.uk/niscc/docs/al-20050412-00308.html
ICMP attacks against TCP: http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html
OTHER REFERENCES: RFC1122 (Requirements for Internet Hosts -- Communication Layers): http://www.ietf.org/rfc/rfc1122.txt
RFC1191 (Path MTU Discovery): http://www.ietf.org/rfc/rfc1191.txt
About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
. The RFC recommends no security checking for in-bound ICMP messages, so long as a related connection exists, and may potentially allow several different Denials of Service.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2004-0790 to this issue.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2004-0791 to this issue.
The Common Vulnerabilities and Exposures project (cve.mitre.org)
has assigned the name CVE-2004-1060 to this issue. Vulnerable Supported Versions
System Binaries
----------------------------------------------------------------------
OpenServer 5.0.6 ip and tcp drivers
OpenServer 5.0.7 ip and tcp drivers
-
Solution
The proper solution is to install the latest packages. OpenServer 5.0.6
4.1 Location of Fixed Binaries
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4
4.2 Verification
MD5 (VOL.000.000) = 03ed8e901780e1535c113efeba72d8cd
md5 is available for download from ftp://ftp.sco.com/pub/security/tools
4.3 Installing Fixed Binaries
The following packages should be installed on your system before you install this fix:
RS506A OSS646 ERG711746: ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt ERG712606: ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt
Upgrade the affected binaries with the following sequence:
1) Download the VOL* files to a directory.
2) Run the custom command, specify an install from media images, and specify the directory as the location of the images. OpenServer 5.0.7
5.1 Location of Fixed Binaries
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4
5.2 Verification
MD5 (VOL.000.000) = 03ed8e901780e1535c113efeba72d8cd
md5 is available for download from ftp://ftp.sco.com/pub/security/tools
5.3 Installing Fixed Binaries
The following package should be installed on your system before you install this fix:
OSR507MP4 - OpenServer 5, Release 5.0.7 Maintenance Pack 4
Upgrade the affected binaries with the following sequence:
1) Download the VOL* files to a directory.
2) Run the custom command, specify an install from media images, and specify the directory as the location of the images. References
Specific references for this advisory: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0790 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0791 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1060
SCO security resources: http://www.sco.com/support/security/index.html
SCO security advisories via email http://www.sco.com/support/forums/security.html
This security fix closes SCO incidents sr892503 fz530662 erg712759. Disclaimer
SCO is not responsible for the misuse of any of the information we provide on this website and/or through our security advisories. Our advisories are a service to our customers intended to promote secure installation and use of SCO products. Acknowledgments
The SCO Group would like to thank Fernando Gont for reporting these issues. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ . This fixes some vulnerabilities, which can be exploited by malicious people to cause a DoS (Denial of Service) on an active TCP session
{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-200504-0003", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "solaris", "scope": "eq", "trust": 1.6, "vendor": "sun", "version": "9.0" }, { "model": "sunos", "scope": "eq", "trust": 1.6, "vendor": "sun", "version": "5.7" }, { "model": "sunos", "scope": "eq", "trust": 1.6, "vendor": "sun", "version": "5.8" }, { "model": "solaris", "scope": "eq", "trust": 1.6, "vendor": "sun", "version": "10.0" }, { "model": "aix", "scope": "eq", "trust": 1.1, "vendor": "ibm", "version": "5.1" }, { "model": "aix", "scope": "eq", "trust": 1.1, "vendor": "ibm", "version": "5.2" }, { "model": "aix", "scope": "eq", "trust": 1.1, "vendor": "ibm", "version": "5.3" }, { "model": "nexland isb soho firewall appliance", "scope": null, "trust": 1.1, "vendor": "symantec", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.9, "vendor": "sun", "version": "7.0" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "nortel", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "redback", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "sun microsystems", "version": null }, { "model": "switchblade 5400s series", "scope": null, "trust": 0.8, "vendor": "allied telesis", "version": null }, { "model": "switchblade 7800s series", "scope": null, "trust": 0.8, "vendor": "allied telesis", "version": null }, { "model": "switchblade4000", "scope": null, "trust": 0.8, "vendor": "allied telesis", "version": null }, { "model": "switch", "scope": "eq", "trust": 0.8, "vendor": "allied telesis", "version": "centrecom 8624xl series" }, { "model": "switch", "scope": "eq", "trust": 0.8, "vendor": "allied telesis", "version": "centrecom 8724sl series" }, { "model": "switch", "scope": "eq", "trust": 0.8, "vendor": "allied telesis", "version": "centrecom 9606 series" }, { "model": "switch", "scope": "eq", "trust": 0.8, "vendor": "allied telesis", "version": "centrecom 9800 series" }, { "model": "router", "scope": "eq", "trust": 0.8, "vendor": "allied telesis", "version": "ar130" }, { "model": "router", "scope": "eq", "trust": 0.8, "vendor": "allied telesis", "version": "ar160" }, { "model": "router", "scope": "eq", "trust": 0.8, "vendor": "allied telesis", "version": "ar300v2" }, { "model": "router", "scope": "eq", "trust": 0.8, "vendor": "allied telesis", "version": "ar300lv2" }, { "model": "router", "scope": "eq", "trust": 0.8, "vendor": "allied telesis", "version": "ar320" }, { "model": "router", "scope": "eq", "trust": 0.8, "vendor": "allied telesis", "version": "ar450s" }, { "model": "router", "scope": "eq", "trust": 0.8, "vendor": "allied telesis", "version": "ar410v2" }, { "model": "router", "scope": "eq", "trust": 0.8, "vendor": "allied telesis", "version": "ar720" }, { "model": "router", "scope": "eq", "trust": 0.8, "vendor": "allied telesis", "version": "ar740" }, { "model": "ax5400s series", "scope": null, "trust": 0.8, "vendor": "alaxala", "version": null }, { "model": "ax7800r series", "scope": null, "trust": 0.8, "vendor": "alaxala", "version": null }, { "model": "ax7800s series", "scope": null, "trust": 0.8, "vendor": "alaxala", "version": null }, { "model": "seil/neu", "scope": "eq", "trust": 0.8, "vendor": "internet initiative", "version": "atm firmware version 1.10 (pogo) ~ 1.39 (smith grind)" }, { "model": "seil/neu", "scope": "eq", "trust": 0.8, "vendor": "internet initiative", "version": "ver. 1.x firmware version 1.52 (inkknot) ~ 1.93 (harness)" }, { "model": "seil/neu", "scope": "eq", "trust": 0.8, "vendor": "internet initiative", "version": "ver. 2.x firmware version 2.00 (belay) ~ 2.27 (ridge)" }, { "model": "seil/plus", "scope": "eq", "trust": 0.8, "vendor": "internet initiative", "version": "firmware version 1.00 (snappy) ~ 1.51 (swisssingle)" }, { "model": "seil/turbo", "scope": "eq", "trust": 0.8, "vendor": "internet initiative", "version": "firmware version 1.00 (union) ~ 1.51 (riodell)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "10 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "10 (x86)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "7.0 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "7.0 (x86)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "8 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "8 (x86)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "9 (sparc)" }, { "model": "solaris", "scope": "eq", "trust": 0.8, "vendor": "sun microsystems", "version": "9 (x86)" }, { "model": "content switching module", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "css 11000 series", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "content services switch" }, { "model": "css 11500 series", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "content services switch" }, { "model": "global site selector", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "ip phone 7900 series", "scope": "eq", "trust": 0.8, "vendor": "cisco", "version": "7940/7960 sip firmware" }, { "model": "mds 9000 series", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "mgx 8250 series", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "mgx 8850 series", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "ws-x6608-e1", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "ws-x6608-t1", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "ws-x6624-fxs", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "nexland pro series firewall appliance", "scope": null, "trust": 0.8, "vendor": "symantec", "version": null }, { "model": "enterprise firewall", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "7.0" }, { "model": "enterprise firewall", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "7.0.4" }, { "model": "enterprise firewall", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "8.0" }, { "model": "firewall/vpn appliance", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "100/200/200r" }, { "model": "gateway security 300 series", "scope": null, "trust": 0.8, "vendor": "symantec", "version": null }, { "model": "gateway security 400 series", "scope": null, "trust": 0.8, "vendor": "symantec", "version": null }, { "model": "gateway security 5300 series", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "v1.0" }, { "model": "gateway security 5400 series", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "v2.x" }, { "model": "velociraptor", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "1.5 model 1100/1200/1300" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.00" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.04" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.11" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.22" }, { "model": "hp-ux", "scope": "eq", "trust": 0.8, "vendor": "hewlett packard", "version": "11.23" }, { "model": "windows 2000", "scope": null, "trust": 0.8, "vendor": "microsoft", "version": null }, { "model": "windows 9x", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "98" }, { "model": "windows 9x", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "98 scd" }, { "model": "windows 9x", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "me" }, { "model": "windows server 2003", "scope": null, "trust": 0.8, "vendor": "microsoft", "version": null }, { "model": "windows xp", "scope": "eq", "trust": 0.8, "vendor": "microsoft", "version": "sp3" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "2.1 (ws)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (as)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (es)" }, { "model": "enterprise linux", "scope": "eq", "trust": 0.8, "vendor": "red hat", "version": "3 (ws)" }, { "model": "univerge ip8800/s,/r series", "scope": null, "trust": 0.8, "vendor": "nec", "version": null }, { "model": "gr2000", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "gr4000", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "gs3000", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "gs4000", "scope": null, "trust": 0.8, "vendor": "hitachi", "version": null }, { "model": "ip telephony pstn gateway", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "ip telephony telephone", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "ip-pbx ip mediaserve", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "ip-pbx ip pathfinder series", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "pbx e-200 series", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "pbx e-3000 series", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "pbx es200 series", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "pbx es3000 series", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "voip gateway ew30ip", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "voip gateway geostreamsi-v series", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "voip router lr-v series", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "switch sb series", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "switch sh series", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "switch si-r series", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "switch sr-s series", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "switch sr series", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "router geostream si-r series", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "router netvehicle series", "scope": null, "trust": 0.8, "vendor": "fujitsu", "version": null }, { "model": "ios 12.0 w5", "scope": "ne", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "ios 12.3", "scope": "ne", "trust": 0.6, "vendor": "cisco", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.6, "vendor": "sun", "version": "8.0" }, { "model": "windows xp home sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "ios 12.3 t", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3b", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "tru64 b-2 pk4", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.1" }, { "model": "firebox", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "v100" }, { "model": "soho firewall", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "5.0.31" }, { "model": "big-ip", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "9.0.2" }, { "model": "ios 12.2yg", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "hp-ux b.11.22", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ios 12.2yx", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3yj", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.5" }, { "model": "coat systems sgos", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "4.1.1" }, { "model": "ios 12.2sz", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1aa", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3.2" }, { "model": "windows server enterprise edition itanium", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20030" }, { "model": "ios 12.3yh", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5" }, { "model": "ios 12.2zh", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "windows xp professional edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "x64" }, { "model": "ios 12.2yr", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "firebox ii", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "4.1" }, { "model": "ios 12.3xi", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "serverlock", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "2.0" }, { "model": "networks umts", "scope": null, "trust": 0.3, "vendor": "nortel", "version": null }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "9.0.3" }, { "model": "ios 12.1xf", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0xf", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0s", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "networks application switch", "scope": null, "trust": 0.3, "vendor": "nortel", "version": null }, { "model": "ios 12.0xm", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 t8", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3yn", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "serverlock", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "2.0.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.2" }, { "model": "velociraptor", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "12001.5" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "9.0.5" }, { "model": "ios 12.1da", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "soho", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "2.2" }, { "model": "soho firewall", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "5.0.29" }, { "model": "ios 12.3 yf2", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 s8", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "windows server enterprise edition itanium sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "ios 12.1xm", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "networks multiprotocol router family asn", "scope": null, "trust": 0.3, "vendor": "nortel", "version": null }, { "model": "soho firewall", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "2.2.1" }, { "model": "hp-ux b.11.04", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "ios 12.2zl", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "coat systems sgos", "scope": "ne", "trust": 0.3, "vendor": "blue", "version": "3.2.5" }, { "model": "m-series router m40", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "serverlock", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "2.0.4" }, { "model": "solaris 8 sparc", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "networks multiprotocol router family anh", "scope": null, "trust": 0.3, "vendor": "nortel", "version": null }, { "model": "networks baystack switch", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "420/425/325" }, { "model": "ios 12.3xw", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yf", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xr", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "firebox", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "25004.5" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "windows server web edition sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "ios 12.2zk", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "csm", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90001.3" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.6" }, { "model": "gateway security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "360" }, { "model": "ios 12.3ja", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "big-ip", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "9.0" }, { "model": "windows server sp4", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows advanced server sp4", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "ios 12.0wc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0xk", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "tru64 f pk8", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.0" }, { "model": "serverlock", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "2.0.3" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.3(110)" }, { "model": "gateway security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "460" }, { "model": "gateway security 360r build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.1300" }, { "model": "ios 12.2 da8", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "firebox", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "45004.6" }, { "model": "networks preside mdm", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": null }, { "model": "windows server datacenter edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "ios 12.0xb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xh", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "tour", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "2.0" }, { "model": "ios 12.1xb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "networks multiprotocol router family pp2430", "scope": null, "trust": 0.3, "vendor": "nortel", "version": null }, { "model": "ios 12.2cx", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "unixware", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "7.1.4" }, { "model": "ios 12.1xe", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2by", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xl", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "windows advanced server sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "gateway security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "53001.0" }, { "model": "ios 12.2b", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "windows xp gold", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "0" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.4" }, { "model": "firebox", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "25004.6" }, { "model": "ios 12.2xu", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 e1", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "windows datacenter server sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "bsd/os", "scope": "eq", "trust": 0.3, "vendor": "windriver", "version": "4.3.1" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "2.9" }, { "model": "soho firewall", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "5.0.35" }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "m-series router m40e", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "ios 12.3 yg1", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "gateway security 360r build", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "2.1415" }, { "model": "windows professional", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "css11000 content services switch", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "networks ethernet routing switch", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "8600" }, { "model": "ip phone", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7902" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.1" }, { "model": "ios 12.0xq", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "local director", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.2(4)" }, { "model": "nexland pro800 firewall appliance", "scope": null, "trust": 0.3, "vendor": "symantec", "version": null }, { "model": "networks passport", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "7000" }, { "model": "networks baystack switch", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "5510/5520" }, { "model": "ios 12.1ec", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0xh", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6" }, { "model": "solaris 7.0 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "networks wlan access point", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "7220.0" }, { "model": "ios 12.1xj", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xl", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "firebox", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "v10" }, { "model": "ios 12.1xi", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2ze", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2cy", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "windows xp home sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "ios xr", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0da", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "networks shasta router", "scope": null, "trust": 0.3, "vendor": "nortel", "version": null }, { "model": "ios 12.2sxa", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xg", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "windows xp 64-bit edition version sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "ios 12.2ey", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0xj", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "windows server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "ios 12.2 s13", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "6.0" }, { "model": "ios 12.2dd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "nexland pro800turbo firewall appliance", "scope": null, "trust": 0.3, "vendor": "symantec", "version": null }, { "model": "windows xp 64-bit edition version", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "ios 12.0st", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "big-ip", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "9.0.5" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "2.6" }, { "model": "ios 12.2sxb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "windows server standard edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003x64" }, { "model": "ios 12.2xm", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0w5", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "coat systems sgos", "scope": "ne", "trust": 0.3, "vendor": "blue", "version": "4.1.2" }, { "model": "networks gsm", "scope": null, "trust": 0.3, "vendor": "nortel", "version": null }, { "model": "ios 12.1xp", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "fireboxii", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "4.0" }, { "model": "ios 12.2xc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xu", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "windows advanced server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "nexland pro100 firewall appliance", "scope": null, "trust": 0.3, "vendor": "symantec", "version": null }, { "model": "firewall/vpn appliance", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "200" }, { "model": "windows xp tablet pc edition sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "ios 12.2yy", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2t", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "velociraptor", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "11001.5" }, { "model": "ios 12.2xg", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "fireboxii", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "4.5" }, { "model": "ios 12.3xh", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "networks optera", "scope": null, "trust": 0.3, "vendor": "nortel", "version": null }, { "model": "advanced workstation for the itanium processor", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "ios 12.1yf", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "fireboxii", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "4.2" }, { "model": "soho firewall", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "1.6" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6608" }, { "model": "ios 12.2 seb", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "firewall/vpn appliance 200r", "scope": null, "trust": 0.3, "vendor": "symantec", "version": null }, { "model": "windows server sp3", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "ios 12.2s", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2so", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "firebox ii", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "4.5" }, { "model": "mgx", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "82501.2.10" }, { "model": "windows server standard edition sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "windows xp media center edition", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "ons ios-based blades", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "15454" }, { "model": "ios 12.2yd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1yj", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "local director", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.2(3)" }, { "model": "ios 12.2 t15", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.2" }, { "model": "serverlock", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "2.0.1" }, { "model": "fireboxii", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "4.4" }, { "model": "firebox", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "v80" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "2.3" }, { "model": "ios 12.2 s3", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "firebox .b1140", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "6.0" }, { "model": "fireboxii", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "4.1" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.1xv" }, { "model": "ios 12.1ev", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2jk", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3yd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "soho firewall", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "5.0.28" }, { "model": "windows datacenter server sp3", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "ios 12.0xn", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2(3)" }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "12.3(13)" }, { "model": "ios 12.2xj", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "windows advanced server sp3", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.3" }, { "model": "ios 12.2bc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xr", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2sy", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "networks optivity network management system", "scope": null, "trust": 0.3, "vendor": "nortel", "version": null }, { "model": "local director", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.2(1)" }, { "model": "ios 12.0xi", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "solaris 8 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "velociraptor", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "13001.5" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6.3" }, { "model": "ios 12.1xq", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "firebox", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "v60" }, { "model": "soho firewall", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "2.1.3" }, { "model": "windows professional sp3", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "netcache c630", "scope": "eq", "trust": 0.3, "vendor": "netappliance", "version": "3.3.1" }, { "model": "ios 12.1yc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xe", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "enterprise firewall solaris", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.0" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6.5" }, { "model": "ios 12.1ea", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xf", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.0" }, { "model": "networks ax7800r", "scope": null, "trust": 0.3, "vendor": "alaxala", "version": null }, { "model": "firebox", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "45004.5" }, { "model": "windows xp home", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "2.8" }, { "model": "ios 12.3xk", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xa", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1db", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "windows server web edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "windows professional sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "tru64 a pk", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.1" }, { "model": "hp-ux b.11.11", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.1" }, { "model": "networks bayrs", "scope": null, "trust": 0.3, "vendor": "nortel", "version": null }, { "model": "windows server sp2", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "windows advanced server sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "ios 12.3yq", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xt", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "coat systems sgme", "scope": null, "trust": 0.3, "vendor": "blue", "version": null }, { "model": "ios 12.2 ew3", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6.2" }, { "model": "coat systems spyware interceptor", "scope": null, "trust": 0.3, "vendor": "blue", "version": null }, { "model": "ios 12.2yk", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2dx", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90001.3(3.33)" }, { "model": "ios 12.3xm", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0sp", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2zd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "nexland pro400 firewall appliance", "scope": null, "trust": 0.3, "vendor": "symantec", "version": null }, { "model": "ios 12.2 eu", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "9.0.1" }, { "model": "ios 12.1ex", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0xe", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3yi", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.6" }, { "model": "ios 12.3xq", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xe", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "mgx pxm1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8850-1.2.11" }, { "model": "ios 12.0xr", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2zp", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yn", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2bw", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ip phone", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7920" }, { "model": "ios 12.2xl", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "windows server datacenter edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003x64" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(1)" }, { "model": "ios 12.2ye", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.10" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "2.5" }, { "model": "ios 12.3xd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "9.0.2" }, { "model": null, "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6608" }, { "model": "networks multiprotocol router family bcn", "scope": null, "trust": 0.3, "vendor": "nortel", "version": null }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "44900" }, { "model": "local director", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.2(2)" }, { "model": "hp-ux b.11.23", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "2.7" }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "12.2(28)" }, { "model": "ios 12.2yv", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xw", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0xd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "bsd/os", "scope": "eq", "trust": 0.3, "vendor": "windriver", "version": "4.2" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.0" }, { "model": "m-series router m160", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "modular messaging", "scope": "eq", "trust": 0.3, "vendor": "avaya", "version": "3.0" }, { "model": "ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7970" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(3.109)" }, { "model": "enterprise firewall nt/2000", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.0" }, { "model": "windows xp tablet pc edition", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "windows server enterprise edition sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "ios 12.2eu", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "coat systems sgos", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "3.2.4" }, { "model": "enterprise linux es", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "fireboxii", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "4.3" }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "5.0.7" }, { "model": "big-ip", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "9.0.3" }, { "model": "ios 12.1eb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "gateway security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "4200" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.12" }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5" }, { "model": "gateway security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "54002.0.1" }, { "model": "networks ax7800s", "scope": null, "trust": 0.3, "vendor": "alaxala", "version": null }, { "model": "ios 12.3bw", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1yd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0xa", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 xi3", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3yf", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0xg", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "aix l", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.1" }, { "model": "ios 12.3yg", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2ewa", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2zg", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yt", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2za", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "networks univity bssm", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": null }, { "model": "ios 12.2 ya9", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3t", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xs", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 bc2", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2ja", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xa", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "9" }, { "model": "networks passport", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "15000" }, { "model": "ios 12.2zc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "gateway security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "54002.0" }, { "model": "catalyst", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6624" }, { "model": "gss global site selector", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "4480" }, { "model": "networks vpn router", "scope": null, "trust": 0.3, "vendor": "nortel", "version": null }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6.2" }, { "model": "windows xp tablet pc edition sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "ios 12.1e", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2sw", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1yi", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2(2)" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "9.0.4" }, { "model": "ios 12.0xl", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1az", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2(3.100)" }, { "model": "ios 12.2da", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "networks multiprotocol router family arn", "scope": null, "trust": 0.3, "vendor": "nortel", "version": null }, { "model": "ios 12.2xi", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yu", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.3" }, { "model": "windows datacenter server sp4", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "firewall/vpn appliance", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "100" }, { "model": "windows datacenter server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "ios 12.1dc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "windows xp professional sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "ios 12.0sl", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "t-series router t640", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "ios 12.2 ey", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "2.1" }, { "model": "networks passport", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "6000" }, { "model": "ios 12.2xk", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "enterprise linux as ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "ios 12.1eu", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xt", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2mc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "vpn concentrator", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "5000" }, { "model": "networks baystack bps2000/460/470 switch", "scope": null, "trust": 0.3, "vendor": "nortel", "version": null }, { "model": "ios 12.2zn", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 ewa", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3.3(133)" }, { "model": "ios 12.1yh", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "3-dns", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.11" }, { "model": "hp-ux b.11.00", "scope": null, "trust": 0.3, "vendor": "hp", "version": null }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3" }, { "model": "ios 12.2sx", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0sz", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1ya", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7960" }, { "model": "ios 12.3xa", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "networks multiprotocol router family bln", "scope": null, "trust": 0.3, "vendor": "nortel", "version": null }, { "model": "ios 12.0sc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xg", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1 ea4", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.12" }, { "model": "networks baystack 380-24t switch", "scope": null, "trust": 0.3, "vendor": "nortel", "version": null }, { "model": "ios 12.1ey", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2su", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2" }, { "model": "ios 12.3 xy4", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "windows datacenter server sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "ios 12.2ew", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3(3.102)" }, { "model": "unixware", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "7.1.3" }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "90002.0(0.86)" }, { "model": "enterprise linux es ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "ios 12.3 yq", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "enterprise linux as", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.2.111" }, { "model": "ios 12.3 yk1", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2se", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "networks ethernet routing switch passport", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "8300" }, { "model": "networks aos", "scope": null, "trust": 0.3, "vendor": "redback", "version": null }, { "model": "ios 12.1eo", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3yk", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yh", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "windows professional sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "ios 12.3xu", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "mgx", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "82501.2.11" }, { "model": "networks alteon switched firewall", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "5100" }, { "model": "enterprise firewall solaris", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "7.0.4" }, { "model": "gateway security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "320" }, { "model": "ios 12.1xd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yz", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "windows xp professional", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "ip phone", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "7905" }, { "model": "fireboxii", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "4.6" }, { "model": "tour", "scope": "ne", "trust": 0.3, "vendor": "hp", "version": "3.0" }, { "model": "open server", "scope": "eq", "trust": 0.3, "vendor": "sco", "version": "5.0.6" }, { "model": "ios 12.2xt", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1xc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2 sxd4", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "m-series router m10", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "bsd/os", "scope": "eq", "trust": 0.3, "vendor": "windriver", "version": "5.0" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "2.4" }, { "model": "networks multiprotocol router family an", "scope": null, "trust": 0.3, "vendor": "nortel", "version": null }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.7" }, { "model": "ip phone", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "7940" }, { "model": "ios 12.2yo", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "big-ip", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "9.0.4" }, { "model": "gateway security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "440" }, { "model": "enterprise linux ws ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "windows xp", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.1" }, { "model": "ons", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "15305" }, { "model": "ios 12.2zj", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2mb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2ex", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "firebox", "scope": "eq", "trust": 0.3, "vendor": "watchguard", "version": "5.0" }, { "model": "windows xp media center edition sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "ios 12.2yl", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1ew", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 ja", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "enterprise firewall solaris", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "7.0" }, { "model": "local director", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.2(5)" }, { "model": "ios 12.1ax", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xj", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "windows server datacenter edition itanium", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "20030" }, { "model": "ios 12.2yc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0 s1", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2sv", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2(1)" }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "12.1(27)" }, { "model": "coat systems sgos", "scope": "eq", "trust": 0.3, "vendor": "blue", "version": "2.1.11" }, { "model": "coat systems cacheos", "scope": null, "trust": 0.3, "vendor": "blue", "version": null }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "3.3" }, { "model": "ios 12.2 bc2f", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xh", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1ye", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.11" }, { "model": "ios 12.3 yi", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.2.2" }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.6.3" }, { "model": "ios 12.3xr", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2bz", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "networks ax5400s", "scope": null, "trust": 0.3, "vendor": "alaxala", "version": null }, { "model": "ios 12.3 t4", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3xy", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2ym", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "gateway security 460r", "scope": null, "trust": 0.3, "vendor": "symantec", "version": null }, { "model": "networks multiprotocol router family pp5430", "scope": null, "trust": 0.3, "vendor": "nortel", "version": null }, { "model": "css11500 content services switch", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "advanced workstation for the itanium processor ia64", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "2.1" }, { "model": "t-series router t320", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "ios 12.0t", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "tru64 b-3", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "5.1" }, { "model": "ios 12.2xq", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "enterprise firewall nt/2000", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "7.0.4" }, { "model": "networks passport", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "20000" }, { "model": "gateway security 360r", "scope": null, "trust": 0.3, "vendor": "symantec", "version": null }, { "model": "local director", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "4.2(6)" }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "2.2" }, { "model": "windows server standard edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "ios 12.2cz", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1yb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.1t", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "local director", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2yw", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2zf", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2xn", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2sxd", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "windows server enterprise edition", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003x64" }, { "model": "mgx", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8850" }, { "model": "ios 12.2xf", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "9.0" }, { "model": "solaris", "scope": "eq", "trust": 0.3, "vendor": "sun", "version": "10" }, { "model": "ios 12.2yq", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.2ya", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3 yn", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "tru64 g pk4", "scope": "eq", "trust": 0.3, "vendor": "hp", "version": "4.0" }, { "model": "aix l", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.2" }, { "model": "m-series router m20", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "ios 12.0xc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "windows xp media center edition sp1", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "windows professional sp4", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "ios 12.2 sxb7", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.3bc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "mds", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "9000" }, { "model": "ios 12.2 s7", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "enterprise linux ws", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3" }, { "model": "solaris 10 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "desktop", "scope": "eq", "trust": 0.3, "vendor": "redhat", "version": "3.0" }, { "model": "m-series router m5", "scope": null, "trust": 0.3, "vendor": "juniper", "version": null }, { "model": "ios 12.3ya", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "big-ip", "scope": "eq", "trust": 0.3, "vendor": "f5", "version": "4.5.9" }, { "model": "windows xp professional sp2", "scope": null, "trust": 0.3, "vendor": "microsoft", "version": null }, { "model": "enterprise firewall nt/2000", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "7.0" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.3xx" }, { "model": "ios", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "12.0xv" }, { "model": "solaris 9 x86", "scope": null, "trust": 0.3, "vendor": "sun", "version": null }, { "model": "ios 12.2xb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "openbsd", "scope": "eq", "trust": 0.3, "vendor": "openbsd", "version": "2.0" }, { "model": "gateway security", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "53101.0" }, { "model": "ios 12.2zb", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0db", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ios 12.0xs", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "big-ip", "scope": "ne", "trust": 0.3, "vendor": "f5", "version": "9.0.1" }, { "model": "windows server datacenter edition sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "aix l", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "5.3" }, { "model": "pix firewall", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "6.3.1" }, { "model": "ios 12.3 t7", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "ons", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "15302" }, { "model": "ios 12.0dc", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "networks passport", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "1100/1150/1200/1250" }, { "model": "windows server sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" }, { "model": "ios 12.2yj", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "networks wlan access point", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "7250.0" }, { "model": "mgx pxm1", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "8850-1.2.10" }, { "model": "windows server datacenter edition itanium sp1", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2003" }, { "model": "ios", "scope": "ne", "trust": 0.3, "vendor": "cisco", "version": "12.3(12)" }, { "model": "networks multiservice access switch", "scope": "eq", "trust": 0.3, "vendor": "nortel", "version": "4400" }, { "model": "ios 12.0sx", "scope": null, "trust": 0.3, "vendor": "cisco", "version": null }, { "model": "windows server", "scope": "eq", "trust": 0.3, "vendor": "microsoft", "version": "2000" } ], "sources": [ { "db": "CERT/CC", "id": "VU#415294" }, { "db": "BID", "id": "13124" }, { "db": "JVNDB", "id": "JVNDB-2005-000244" }, { "db": "CNNVD", "id": "CNNVD-200504-030" }, { "db": "NVD", "id": "CVE-2004-0791" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:ibm:aix", "vulnerable": true }, { "cpe22Uri": "cpe:/h:allied_telesis_k.k.:switchblade_5400s", "vulnerable": true }, { "cpe22Uri": "cpe:/h:allied_telesis_k.k.:switchblade_7800s", "vulnerable": true }, { "cpe22Uri": "cpe:/h:allied_telesis_k.k.:switchblade4000", "vulnerable": true }, { "cpe22Uri": "cpe:/h:allied_telesis_k.k.:switch", "vulnerable": true }, { "cpe22Uri": "cpe:/h:allied_telesis_k.k.:router", "vulnerable": true }, { "cpe22Uri": "cpe:/h:alaxala:ax5400s", "vulnerable": true }, { "cpe22Uri": "cpe:/h:alaxala:ax7800r", "vulnerable": true }, { "cpe22Uri": "cpe:/h:alaxala:ax7800s", "vulnerable": true }, { "cpe22Uri": "cpe:/o:sun:solaris", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:content_switching_module", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:css_11000", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:css_11500", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:gss_global_site_selector", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:ip_phone_7900", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:mds_9000", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:mgx_8250", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:mgx_8850", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:ws-x6608-e1", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:ws-x6608-t1", "vulnerable": true }, { "cpe22Uri": "cpe:/h:cisco:ws-x6624-fxs", "vulnerable": true }, { "cpe22Uri": "cpe:/h:symantec:nexland_isb_soho_firewall_appliance", "vulnerable": true }, { "cpe22Uri": "cpe:/h:symantec:nexland_pro_firewall_appliance", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:enterprise_firewall", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:firewall_vpn_appliance", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:gateway_security_300", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:gateway_security_400", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:gateway_security_5300", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:gateway_security_5400", "vulnerable": true }, { "cpe22Uri": "cpe:/a:symantec:symantec_velociraptor", "vulnerable": true }, { "cpe22Uri": "cpe:/o:hp:hp-ux", "vulnerable": true }, { "cpe22Uri": "cpe:/o:microsoft:windows_2000", "vulnerable": true }, { "cpe22Uri": "cpe:/o:microsoft:windows-9x", "vulnerable": true }, { "cpe22Uri": "cpe:/o:microsoft:windows_server_2003", "vulnerable": true }, { "cpe22Uri": "cpe:/o:microsoft:windows_xp", "vulnerable": true }, { "cpe22Uri": "cpe:/o:redhat:enterprise_linux", "vulnerable": true }, { "cpe22Uri": "cpe:/h:nec:univerge_ip8800_s_r", "vulnerable": true }, { "cpe22Uri": "cpe:/h:hitachi:gr2000", "vulnerable": true }, { "cpe22Uri": "cpe:/h:hitachi:gr4000", "vulnerable": true }, { "cpe22Uri": "cpe:/h:hitachi:gs3000", "vulnerable": true }, { "cpe22Uri": "cpe:/h:hitachi:gs4000", "vulnerable": true }, { "cpe22Uri": "cpe:/h:fujitsu:pstn_gateway", "vulnerable": true }, { "cpe22Uri": "cpe:/h:fujitsu:ip_telephony", "vulnerable": true }, { "cpe22Uri": "cpe:/h:fujitsu:ip-pbx_ip_mediaserve", "vulnerable": true }, { "cpe22Uri": "cpe:/h:fujitsu:ip_pathfinder", "vulnerable": true }, { "cpe22Uri": "cpe:/h:fujitsu:pbx_e-200", "vulnerable": true }, { "cpe22Uri": "cpe:/h:fujitsu:pbx_e-3000", "vulnerable": true }, { "cpe22Uri": "cpe:/h:fujitsu:pbx_es200", "vulnerable": true }, { "cpe22Uri": "cpe:/h:fujitsu:pbx_es3000", "vulnerable": true }, { "cpe22Uri": "cpe:/h:fujitsu:voip_gateway_ew30ip", "vulnerable": true }, { "cpe22Uri": "cpe:/h:fujitsu:geostreamsi-v", "vulnerable": true }, { "cpe22Uri": "cpe:/h:fujitsu:voip_router_lr-v", "vulnerable": true }, { "cpe22Uri": "cpe:/h:fujitsu:switch_sb", "vulnerable": true }, { "cpe22Uri": "cpe:/h:fujitsu:switch_sh", "vulnerable": true }, { "cpe22Uri": "cpe:/h:fujitsu:switch_si-r", "vulnerable": true }, { "cpe22Uri": "cpe:/h:fujitsu:switch_sr-s", "vulnerable": true }, { "cpe22Uri": "cpe:/h:fujitsu:switch_sr", "vulnerable": true }, { "cpe22Uri": "cpe:/h:fujitsu:geostream_si-r", "vulnerable": true }, { "cpe22Uri": "cpe:/h:fujitsu:netvehicle", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000244" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Fernando Gont", "sources": [ { "db": "CNNVD", "id": "CNNVD-200504-030" } ], "trust": 0.6 }, "cve": "CVE-2004-0791", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CVE-2004-0791", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 1.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2004-0791", "trust": 1.0, "value": "MEDIUM" }, { "author": "CARNEGIE MELLON", "id": "VU#415294", "trust": 0.8, "value": "12.90" }, { "author": "NVD", "id": "CVE-2004-0791", "trust": 0.8, "value": "Medium" }, { "author": "CNNVD", "id": "CNNVD-200504-030", "trust": 0.6, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#415294" }, { "db": "JVNDB", "id": "JVNDB-2005-000244" }, { "db": "CNNVD", "id": "CNNVD-200504-030" }, { "db": "NVD", "id": "CVE-2004-0791" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Multiple TCP/IP and ICMP implementations allow remote attackers to cause a denial of service (network throughput reduction for TCP connections) via a blind throughput-reduction attack using spoofed Source Quench packets, aka the \"ICMP Source Quench attack.\" NOTE: CVE-2004-0790, CVE-2004-0791, and CVE-2004-1060 have been SPLIT based on different attacks; CVE-2005-0065, CVE-2005-0066, CVE-2005-0067, and CVE-2005-0068 are related identifiers that are SPLIT based on the underlying vulnerability. While CVE normally SPLITs based on vulnerability, the attack-based identifiers exist due to the variety and number of affected implementations and solutions that address the attacks instead of the underlying vulnerabilities. A vulnerability exists in the reliance of the Border Gateway Protocol (BGP) on the Transmission Control Protocol (TCP) to maintain persistent sessions. Sustained exploitation of this vulnerability could lead to a denial-of-service condition affecting a large segment of the Internet community. Normal operations would most likely resume shortly after the attack stopped. In multiple vendor products TCP The implementation of ICMP Included in error message IP Address and TCP There is a flaw that only validates the port and does not check that the sequence number is in the proper range. This ICMP source quench Established by processing error messages TCP There is a vulnerability that reduces connection throughput. The vulnerability is ICMP Vulnerabilities resulting from message processing (CVE-2004-0790, CVE-2004-0791, CVE-2004-1060) Out of CVE-2004-0791 Vulnerability published as. TCP Due to vulnerabilities that affect implementation, a wide range of products are affected by these vulnerabilities. For more information, NISCC-532967 (JVN) , NISCC Advisory 532967/NISCC/ICMP (CPNI Advisory 00303) Please check also.Intentionally created fraud ICMP By processing error messages TCP Connection is reset, resulting in service disruption (DoS) It can cause a condition. Multiple vendor implementations of TCP/IP Internet Control Message Protocol (ICMP) are reported prone to several denial-of-service attacks. \nICMP is employed by network nodes to determine certain automatic actions to take based on network failures reported by an ICMP message. \nReportedly, the RFC doesn\u0027t recommend security checks for ICMP error messages. As long as an ICMP message contains a valid source and destination IP address and port pair, it will be accepted for an associated connection. \nThe following individual attacks are reported:\n- A blind connection-reset attack. This attack takes advantage of the specification that describes that on receiving a \u0027hard\u0027 ICMP error, the corresponding connection should be aborted. The Mitre ID CAN-2004-0790 is assigned to this issue. \nA remote attacker may exploit this issue to terminate target TCP connections and deny service for legitimate users. \n- An ICMP Source Quench attack. The Mitre ID CAN-2004-0791 is assigned to this issue. \nA remote attacker may exploit this issue to degrade the performance of TCP connections and partially deny service for legitimate users. \n- An attack against ICMP PMTUD is reported to affect multiple vendors when they are configured to employ PMTUD. By sending a suitable forged ICMP message to a target host, an attacker may reduce the MTU for a given connection. The Mitre ID CAN-2004-1060 is assigned to this issue. \nA remote attacker may exploit this issue to degrade the performance of TCP connections and partially deny service for legitimate users. \n**Update: Microsoft platforms are also reported prone to these issues. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA1\n\nHP SECURITY BULLETIN\n\nHPSBUX01164 REVISION: 4\n\nSSRT4884 rev.4 - HP-UX TCP/IP Remote Denial of Service (DoS)\n\nNOTICE:\nThere are no restrictions for distribution of this Security\nBulletin provided that it remains complete and intact. \n\nThe information in this Security Bulletin should be acted upon\n as soon as possible. \n\nINITIAL RELEASE:\n10 July 2005\n\nPOTENTIAL SECURITY IMPACT:\nRemote Denial of Service (DoS)\n\nSOURCE:\nHewlett-Packard Company\nHP Software Security Response Team\n\nVULNERABILITY SUMMARY:\nA potential security vulnerability has been identified with HP-UX\nrunning TCP/IP. This vulnerability could be remotely exploited by\nan unauthorized user to cause a Denial of Service(DoS). \n\nREFERENCES:\nNISCC VU#532967, CAN-2004-0790, CAN-2004-0791, CAN-2004-1060\n\nSUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. \nHP-UX B.11.00, B.11.04, B.11.11, B.11.22, B.11.23 running TCP/IP. \nHP-UX B.11.11 and B.11.23 running TOUR (Transport Optional Upgrade\nRelease). \n\nBACKGROUND:\n\n AFFECTED VERSIONS\n\n HP-UX B.11.22\n HP-UX B.11.00\n =============\n Networking.NET2-KRN\n action: set ip_pmtu_strategy= 0 and either install binary\n files or filter ICMP\n\n HP-UX B.11.11\n =============\n Networking.NET2-KRN\n action: set ip_pmtu_strategy= 0 and install PHNE_33159\n\n HP-UX B.11.23\n =============\n Networking.NET2-KRN\n -\u003eaction: set ip_pmtu_strategy= 0 and install PHNE_32606\n\n HP-UX B.11.11\n HP-UX B.11.23\n =============\n TOUR_PRODUCT.T-NET2-KRN\n action: set ip_pmtu_strategy= 0 and filter ICMP\n\n\n HP-UX B.11.04\n =============\n Networking.NET2-KRN\n action: set ip_pmtu_strategy= 0 and filter ICMP\n\n END AFFECTED VERSIONS\n\n\n Note: The latest TOUR (Transport Optional Upgrade Release),\n version 2.4, is available on B.11.11 only. The latest\n Transport Functionality is available to B.11.23 customers\n in the HP-UX 11i v2 September 2004 release. Customers\n using TOUR on B.11.23 can apply the workaround (set\n ip_pmtu_strategy= 0 and filter ICMP) or upgrade to the\n HP-UX 11i v2 September 2004 release. After upgrading the\n action for B.11.23 Networking.NET2-KRN listed above should\n be implemented. \n\n\u003chttp://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?\nlang=en\u003e\n\nThere are three issues reported in NISCC VU#532967:\n\n CVE number: CAN-2004-0790\n \u003chttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0790\u003e\n CVE number: CAN-2004-0791\n \u003chttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-0791\u003e\n CVE number: CAN-2004-1060\n \u003chttp://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2004-1060\u003e\n\nWorkarounds are available for all three of these issues. \n\nUntil binary files are available for B.11.04 the workarounds\nshould be used. \n\n\n -\u003eBinary files are available for CAN-2004-0790 and CAN-2004-0791\nfor HP-UX B.11.00 and B.11.22. \n\nSince PHNE_33159 is now available for B.11.11 the preliminary\nbinary files for B.11.11 have been removed from the ftp site. \n\n -\u003eSince PHNE_32606 is now available for B.11.23 the preliminary\nbinary files for B.11.23 have been removed from the ftp site. \n\n\nNote: If the TOUR (Transport Optional Upgrade Release) product is\n installed the binary files cannot be used. \n\nUntil the TOUR product is revised there are several options:\n\n B.11.11\n 1. Use the workarounds. \n or\n 2. Remove TOUR and install the binary files. \n\n B.11.23\n 1. Use the workarounds. \n or\n 2. Upgrade to the HP-UX 11i v2 September 2004 release\n and install the binary files. \n\nTOUR(Transport Optional Upgrade Release) is available from\n\u003chttp://www.hp.com/go/softwaredepot\u003e. \n\n\nWorkaround for CAN-2004-1060 may not be necessary. \n===================================\nAlthough changes in the binary files and patches for CAN-2004-0790\nand CAN-2004-0791 do not prevent the exploit of CAN-2004-1060,\nthey do make it less likely to succeed. The sequence number check\nsuggested in section 5.1 of \u003chttp://www.ietf.org/internet-drafts/\ndraft-gont-tcpm-icmp-attacks-03.txt\u003e has been implemented. \nCustomers should consider whether this check reduces the risk of\nthe exploit to the point that setting ip_pmtu_strategy=0 is not\nrequired. \n\nIf the workaround for CAN-2004-1060 is to be used, please note\nthe following:\n=================================================\nHPSBUX01137 recommends setting ip_pmtu_strategy = 0 or 3 as a\nworkaround for the problem of CAN-2005-1192. CAN-2004-1060 has a\ndifferent root cause and cannot be worked around with\np_pmtu_strategy=3. To work around both CAN-2005-1192 and\nCAN-2004-1060 ip_pmtu_strategy=0 must be used. \n\nPlease refer to the Manual Actions section below for a summary of\nthe required actions. \n\nWorkarounds:\n\n CAN-2004-0790 and CAN-2004-0791\n\n Filter out the following ICMP messages:\n\n Type 3, Code 2 (Destination Unreachable, Protocol Unreachable)\n Type 3, Code 3 (Destination Unreachable, Port Unreachable)\n Type 4, Code 0 (Source Quench)\n\n CAN-2004-1060\n\n Set ip_pmtu_strategy=0. \n\nNote: Filtering \"Protocol Unreachable\" and \"Port Unreachable\"\n should not be done without careful testing. Filtering these\n out may interfere with the correct functioning of network\n components. \n Filtering \"Source Quench\" should present little risk. \n\n\nSetting ip_pmtu_strategy=0\n==================\nEdit /etc/rc.config.d/nddconf to add the following:\n\nTRANSPORT_NAME[n]=ip\nNDD_NAME[n]=ip_pmtu_strategy\nNDD_VALUE[n]=0\n\nwhere \u0027n\u0027 is the next available index value as described in the\nnddconf comments. \n\nThis value will take effect when the system is rebooted. \nUntil the system can be rebooted use the following command\nto read the /etc/rc.config.d/nddconf file and set the tunable\nparameters:\n\n /usr/bin/ndd -c\n\nThe ip_pmtu_strategy parameter can be displayed by the\nfollowing command:\n\n /usr/bin/ndd -get /dev/ip ip_pmtu_strategy\n\nNote: Since open connections will remain potentially vulnerable\n until they are closed and certain internal data structures\n are released it is recommended that the system be rebooted. \n\nNote: There is a defect that will cause \"ndd -c\" to fail if there\n are more than 10 directives in /etc/rc.config.d/nddconf. \n That defect is fixed in the following patches:\n\n B.11.11 - PHNE_25644 or subsequent\n B.11.04 - PHNE_26076 or subsequent\n B.11.00 - PHNE_26125 or subsequent\n\n\nPreliminary binary files\n==============\n\n -\u003ePreliminary binary files are available for B.11.00 and B.11.22. \nPatches are available for B.11.11 and B.11.23. The patches and\nthe preliminary binary files address CAN-2004-0790 and\nCAN-2004-0791 only. Although changes in the patches and binary\nfiles for CAN-2004-0790 and CAN-2004-0791 do not prevent the\nexploit of CAN-2004-1060, they do make it less likely to succeed. \n\nInstructions for downloading and installing the binary files are\ncontained in readme files available here:\n\n System: hprc.external.hp.com (192.170.19.51)\n Login: icmp\n Password: icmp\n\n FTP Access:\n ftp://icmp:icmp@hprc.external.hp.com/\n or: ftp://icmp:icmp@192.170.19.51/\n Note: The links above may not work for all browsers. If the\n link fails the url should be entered directly into the\n browser\u0027s address field. \n\nSince a patch is available for B.11.11 the readme.11.11.txt and\ncorresponding binary files have been removed from the ftp site. \n\n -\u003eSince a patch is available for B.11.23 the readme.11.23.txt and\ncorresponding binary files have been removed from the ftp site. \n\n\nDownload the appropriate readme file containing further\ninstructions:\n\n readme.11.00.txt\n readme.11.22.txt\n\nVerify the cksum or md5sum:\n\n -\u003eNote: The readme files have not changed since rev.1 of this\n Security Bulletin. \n\n cksum readme*\n 2844254744 2546 readme.11.00.txt\n 2836317466 2469 readme.11.22.txt\n\n md5sum readme*\n d28504f8532192de6a4f33bba4ea90ec readme.11.00.txt\n cafbb24f3dc7131501142f75deaeccbd readme.11.22.txt\n\nDownload and install the binary files as discussed in the readme\nfiles. The binary files are available in the same directory as\nthe readme files. \n\nFor B.11.11 download and install PHNE_33159. The patch is\navailable from \u003c http://itrc.hp.com\u003e. \n\n -\u003eFor B.11.23 download and install PHNE_32606. The patch is\navailable from \u003c http://itrc.hp.com\u003e. \n\n\n\nMANUAL ACTIONS: Yes - NonUpdate\n1. Set ip_pmtu_strategy=0\n\n2. EITHER\n a. Filter out the following ICMP messages:\n\n Type 3, Code 2 (Destination Unreachable, Protocol Unreachable)\n Type 3, Code 3 (Destination Unreachable, Port Unreachable)\n Type 4, Code 0 (Source Quench)\n\n OR\n\n b. Install the appropriate binary file or patch (binary file\n not available for B.11.04). \n\nBULLETIN REVISION HISTORY:\nRevision 0: 25 May 2005\n Initial release\n\nRevision 1: 1 June 2005\n Binary files for B.11.00 and B.11.22 are available. \n Added information about CAN-2004-1060. \n The \"set ip_pmtu_strategy=0\" workaround is required even if\n binary files are installed. \n Removed IPSec information. \n\nRevision 2: 19 June 2005\n TOUR (Transport Optional Upgrade Release) on B.11.11 and B.11.23\n is potentially vulnerable. \n Added a description of the sequence number check implemented in\n the binary files. \n\nRevision 3: 27 June 2005\n PHNE_33159 is available for B.11.11. The B.11.11 binary files\n have been removed from the ftp site. \n\nRevision 4: 10 July 2005\n PHNE_32606 is available for B.11.23. The B.11.23 binary files\n have been removed from the ftp site. \n\n\n\nHP-UX SPECIFIC SECURITY BULLETINS*: Security Patch Check revision\nB.02.00 analyzes all HP-issued Security Bulletins to provide a\nsubset of recommended actions that potentially affect a specific\nHP-UX system. \n\nFor more information:\nhttp://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/\ndisplayProductInfo.pl?productNumber=B6834AA\n\n\nSUPPORT: For further information, contact normal HP Services\nsupport channel. \n\nREPORT: To report a potential security vulnerability with any HP\nsupported product, send Email to: security-alert@hp.com. It is\nstrongly recommended that security related information being\ncommunicated to HP be encrypted using PGP, especially exploit\ninformation. To obtain the security-alert PGP key please send an\ne-mail message to security-alert@hp.com with the Subject of\n\u0027get key\u0027 (no quotes). \n\nSUBSCRIBE: To initiate a subscription to receive future HP\nSecurity Bulletins via Email:\n\nhttp://h30046.www3.hp.com/driverAlertProfile.php?regioncode=NA\u0026\nlangcode=USENG\u0026jumpid=in_SC-GEN__driverITRC\u0026topiccode=ITRC\n\nOn the web page: ITRC security bulletins and patch sign-up\nUnder Step1: your IRTC security bulletins and patches\n - check ALL categories for which alerts are required and\n continue. \nUnder Step2: your IRTC operating systems\n - verify your operating system selections are checked and\n save. \n\nTo update an existing subscription:\nhttp://h30046.www3.hp.com/subSignIn.php\n\nLog in on the web page\n Subscriber\u0027s choice for Business: sign-in. \nOn the Web page:\n Subscriber\u0027s Choice: your profile summary\n - use Edit Profile to update appropriate sections. \n\nTo review previously published Security Bulletins visit:\nhttp://itrc.hp.com/service/cki/secBullArchive.do\n\n* The Software Product Category that this Security Bulletin\n relates to is represented by the 5th and 6th characters of the\n Bulletin number:\n GN = HP General SW,\n MA = HP Management Agents,\n MI = Misc. 3rd party SW,\n MP = HP MPE/iX,\n NS = HP NonStop Servers,\n OV = HP OpenVMS,\n PI = HP Printing \u0026 Imaging,\n ST = HP Storage SW,\n TL = HP Trusted Linux,\n TU = HP Tru64 UNIX,\n UX = HP-UX,\n VV = HP Virtual Vault\n\nSystem management and security procedures must be reviewed\nfrequently to maintain system integrity. HP is continually\nreviewing and enhancing the security features of software products\nto provide customers with current secure solutions. \n\n\"HP is broadly distributing this Security Bulletin in order to\nbring to the attention of users of the affected HP products the\nimportant security information contained in this Bulletin. HP\nrecommends that all users determine the applicability of this\ninformation to their individual situations and take appropriate\naction. HP does not warrant that this information is necessarily\naccurate or complete for all user situations and, consequently, HP\nwill not be responsible for any damages resulting from user\u0027s use\nor disregard of the information provided in this Bulletin. To the\nextent permitted by law, HP disclaims all warranties, either\nexpress or implied, including the warranties of merchantability\nand fitness for a particular purpose, title and non-infringement.\"\n\n\n(c)Copyright 2005 Hewlett-Packard Development Company, L.P. \nHewlett-Packard Company shall not be liable for technical or\neditorial errors or omissions contained herein. The information\nprovided is provided \"as is\" without warranty of any kind. To the\nextent permitted by law, neither HP nor its affiliates,\nsubcontractors or suppliers will be liable for incidental, special\nor consequential damages including downtime cost; lost profits;\ndamages relating to the procurement of substitute products or\nservices; or damages for loss of data, or software restoration. \nThe information in this document is subject to change without\nnotice. Hewlett-Packard Company and the names of Hewlett-Packard\nproducts referenced herein are trademarks of Hewlett-Packard\nCompany in the United States and other countries. Other product\nand company names mentioned herein may be trademarks of their\nrespective owners. \n\n-----BEGIN PGP SIGNATURE-----\nVersion: PGP 8.1\n\niQA/AwUBQtJVE+AfOvwtKn1ZEQKwPwCeLKNxE1048xGZniru4epJ6YAqYIcAn2+Y\nfjKXZ3hbnTeQeIn9Kk9ePC1d\n=cFE+\n-----END PGP SIGNATURE-----\n\n. \nHP Tru64 UNIX 5.1B-3\nHP Tru64 UNIX 5.1B-2/PK4\nHP Tru64 UNIX 5.1A PK\nHP Tru64 UNIX 4.0G PK4\nHP Tru64 UNIX 4.0F PK8\n\nBACKGROUND:\n\nSpecial Instructions for the Customer\n\nThe Internet Control Message Protocol (ICMP) (RFC 792) is used in\nthe Internet Architecture to perform fault-isolation and recovery\n(RFC816), which is the group of actions that hosts and routers\ntake to determine if a network failure has occurred. \n\nThe industry standard TCP specification (RFC 793) has a\nvulnerability whereby ICMP packets can be used to perform a\nvariety of attacks such as blind connection reset attacks and\nblind throughput-reduction attacks. \n\nPath MTU Discovery (RFC 1191) describes a technique for\ndynamically discovering the MTU (maximum transmission unit) of an\narbitrary internet path. This protocol uses ICMP packets from\nthe router to discover the MTU for a TCP connection path. \n\nHP has addressed these potential vulnerabilities by providing a\nnew kernel tunable in Tru64 UNIX V5.1B and 5.1A,\nicmp_tcpseqcheck. In Tru64 4.0F and 4.0G, HP has introduced two\nnew kernel tunables, icmp_tcpseqcheck and icmp_rejectcodemask. This behavior protects TCP\nagainst spoofed ICMP packets. \n\nSet the tunable as follows:\n\n icmp_tcpseqcheck=1 (default)\n\n Provides a level of protection that reduces the possibility\n of considering a spoofed ICMP packet as valid\n to one in two raised to the thirty-second power. \n\n icmp_tcpseqcheck=0\n\n Retains existing behavior, i.e., accepts all ICMP packets\n\nicmp_rejectcodemask\n\nIn the Requirements for IP Version 4 Routers (RFC 1812), research\nsuggests that the use of ICMP Source Quench packets is an\nineffective (and unfair) antidote for congestion. Thus, HP\nrecommends completely ignoring ICMP Source Quench packets using\nthe icmp_rejectcodemask tunable. The icmp_rejectcodemask is a\nbitmask that designates the ICMP codes that the system should\nreject. For example, to reject ICMP Source Quench packets,\nset the mask bit position for the ICMP_SOURCEQUENCH code 4,\nwhich is two to the 4th power = 16 (0x10 hex). \nThe icmp_rejectcodemask tunable can be used to reject any\nICMP packet type, or multiple masks can be combined to reject\nmore than one type. \n\nNote: the ICMP type codes are defined in\n \"/usr/include/netinet/ip_icmp.h\". \n\n Set the tunable as follows:\n\n icmp_rejectcodemask = 0x10\n\n Rejects ICMP Source Quench packets\n\n icmp_rejectcodemask = 0 (default)\n\n Retains existing behavior, i.e., accepts all ICMP packets\n\nAdjusting the variables\n\nThe ICMP sequence check variable (icmp_tcpseqcheck) can be\nadjusted using the sysconfig and sysconfigdb commands:\n\n# sysconfig -q inet icmp_tcpseqcheck\ninet:\nicmp_tcpseqcheck = 1\n# sysconfig -r inet icmp_tcpseqcheck=0\nicmp_tcpseqcheck: reconfigured\n# sysconfig -q inet icmp_tcpseqcheck\ninet:\nicmp_tcpseqcheck = 0\n# sysconfig -q inet icmp_tcpseqcheck \u003e /tmp/icmp_tcpseqcheck_merge\n# sysconfigdb -m -f /tmp/icmp_tcpseqcheck_merge inet\n# sysconfigdb -l inet\n\ninet:\n icmp_tcpseqcheck = 1\n\nSimilarly, the icmp_rejectcodemask variable can be adjusted using\nthe sysconfig and sysconfigdb commands:\n\n# sysconfig -q inet icmp_rejectcodemask\ninet:\nicmp_rejectcodemask = 0\n# sysconfig -r inet icmp_rejectcodemask=0x10\nicmp_rejectcodemask: reconfigured\n# sysconfig -q inet icmp_rejectcodemask\ninet:\nicmp_rejectcodemask = 16\n# sysconfig -q inet icmp_rejectcodemask\n \u003e /tmp/icmp_rejectcodemask_merge\n# sysconfigdb -m -f /tmp/icmp_rejectcodemask_merge inet\n# sysconfigdb -l inet\n\ninet:\n icmp_rejectcodemask = 16\n\nRESOLUTION:\n\nUntil the corrections are available in a mainstream\nrelease patch kit, HP is releasing the following Early Release\nPatch (ERP) kits publicly for use by any customer. \n\nThe ERP kits use dupatch to install and will not install over\nany installed Customer Specific Patches (CSPs) that have file\nintersections with the ERPs. Contact your service provider for\nassistance if the ERP installation is blocked by any of your\ninstalled CSPs. \n\nThe fixes contained in the ERP kits are scheduled to be\navailable in the following mainstream patch kits:\n\n HP Tru64 Unix 5.1B-4\n\nEarly Release Patches\n\nThe ERPs deliver the following file:\n\n/sys/BINARY/inet.mod\n\nHP Tru64 UNIX 5.1B-3 ERP Kit Name:\n T64KIT0025925-V51BB26-ES-20050628\nKit Location:\n http://www.itrc.hp.com/service/patch/patchDetail.do?\n patchid=T64KIT0025925-V51BB26-ES-20050628\nMD5 checksum: 129251787a426320af16cd584b982027\n\nHP Tru64 UNIX 5.1B-2/PK4 ERP Kit Name:\n T64KIT0025924-V51BB25-ES-20050628\nKit Location:\n http://www.itrc.hp.com/service/patch/patchDetail.do?\n patchid=T64KIT0025924-V51BB25-ES-20050628\nMD5 checksum: 5fcc77a6876db6d10ef07ac96e11b3af\n\nHP Tru64 UNIX 5.1A PK6 ERP Kit Name:\n T64KIT0025922-V51AB24-ES-20050628\nKit Location:\n http://www.itrc.hp.com/service/patch/patchDetail.do?\n patchid=T64KIT0025922-V51AB24-ES-20050628\nMD5 checksum: 7c373b35c95945651a1cfda96bf71421\n\nHP Tru64 UNIX 4.0G PK4 ERP Kit Name:\n T64KIT0025920-V40GB22-ES-20050628\nKit Location:\n http://www.itrc.hp.com/service/patch/patchDetail.do?\n patchid=T64KIT0025920-V40GB22-ES-20050628\nMD5 checksum: 13849fd555239d75d300d1cb46dc995f\n\nHP Tru64 UNIX 4.0F PK8 ERP Kit Name:\n DUXKIT0025921-V40FB22-ES-20050628\nKit Location:\n http://www.itrc.hp.com/service/patch/patchDetail.do?\n patchid=T64KIT0025920-V40GB22-ES-20050628\nMD5 checksum: 743b614d39f185802701b7f2dd14ffa5\n\nMD5 checksums are available from the ITRC patch database main\npage:\n http://www.itrc.hp.com/service/patch/mainPage.do\n- From the patch database main page, click Tru64 UNIX,\nthen click verifying MD5 checksums under useful links. \n----------------------------------------------------------------------\n\nWant a new IT Security job?\n\nVacant positions at Secunia:\nhttp://secunia.com/secunia_vacancies/\n\n----------------------------------------------------------------------\n\nTITLE:\nCisco Various Products ICMP Message Handling Denial of Service\n\nSECUNIA ADVISORY ID:\nSA14904\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/14904/\n\nCRITICAL:\nLess critical\n\nIMPACT:\nDoS\n\nWHERE:\n\u003eFrom remote\n\nOPERATING SYSTEM:\nCisco Content Services Switch 11000 Series (WebNS)\nhttp://secunia.com/product/1507/\nCisco Global Site Selector (GSS) 4480 1.x\nhttp://secunia.com/product/2270/\nCisco IOS 10.x\nhttp://secunia.com/product/184/\nCisco IOS 11.x\nhttp://secunia.com/product/183/\nCisco IOS 12.x\nhttp://secunia.com/product/182/\nCisco IOS R11.x\nhttp://secunia.com/product/53/\nCisco IOS R12.x\nhttp://secunia.com/product/50/\nCisco IOS XR (CRS-1) 3.x\nhttp://secunia.com/product/4907/\nCisco ONS 15000 Series\nhttp://secunia.com/product/684/\nCisco PIX 6.x\nhttp://secunia.com/product/56/\nCisco SAN-OS 1.x (MDS 9000 Switches)\nhttp://secunia.com/product/3214/\n\nDESCRIPTION:\nFernando Gont has published an Internet-Draft describing how ICMP\n(Internet Control Message Protocol) can be exploited by malicious\npeople to cause a DoS (Denial of Service). Cisco has acknowledged\nthat various Cisco products are affected. \n\nThe published Internet-Draft details three types of attacks, which\nutilize the following ICMP messages to cause a negative impact on TCP\nconnections either terminating or originating from a vulnerable\ndevice. \n\nSOLUTION:\nSee patch matrix in vendor advisory for information about fixes. \nhttp://www.cisco.com/warp/public/707/cisco-sa-20050412-icmp.shtml#software\n\nPROVIDED AND/OR DISCOVERED BY:\nFernando Gont\n\nORIGINAL ADVISORY:\nCisco:\nhttp://www.cisco.com/warp/public/707/cisco-sa-20050412-icmp.shtml\n\nNISCC:\nhttp://www.niscc.gov.uk/niscc/docs/al-20050412-00308.html\n\nICMP attacks against TCP:\nhttp://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html\n\nOTHER REFERENCES:\nRFC1122 (Requirements for Internet Hosts -- Communication Layers):\nhttp://www.ietf.org/rfc/rfc1122.txt\n\nRFC1191 (Path MTU Discovery):\nhttp://www.ietf.org/rfc/rfc1191.txt\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n. The RFC recommends no security checking\n \tfor in-bound ICMP messages, so long as a related connection\n \texists, and may potentially allow several different Denials of\n \tService. \n\n \tThe Common Vulnerabilities and Exposures project (cve.mitre.org)\n \thas assigned the name CVE-2004-0790 to this issue. \n\n \tThe Common Vulnerabilities and Exposures project (cve.mitre.org)\n \thas assigned the name CVE-2004-0791 to this issue. \n\n \tThe Common Vulnerabilities and Exposures project (cve.mitre.org)\n \thas assigned the name CVE-2004-1060 to this issue. Vulnerable Supported Versions\n\n \tSystem\t\t\t\tBinaries\n \t----------------------------------------------------------------------\n \tOpenServer 5.0.6 \t\tip and tcp drivers\n \tOpenServer 5.0.7 \t\tip and tcp drivers\n\n\n3. Solution\n\n \tThe proper solution is to install the latest packages. OpenServer 5.0.6\n\n \t4.1 Location of Fixed Binaries\n\n \tftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4\n\n\n \t4.2 Verification\n\n \tMD5 (VOL.000.000) = 03ed8e901780e1535c113efeba72d8cd\n\n \tmd5 is available for download from\n \t\tftp://ftp.sco.com/pub/security/tools\n\n\n \t4.3 Installing Fixed Binaries\n\n \tThe following packages should be installed on your system before\n \tyou install this fix:\n\n \t\tRS506A\n \t\tOSS646\n \t\tERG711746: ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.3/SCOSA-2005.3.txt\n \t\tERG712606: ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2005.9/SCOSA-2005.9.txt\n\n \tUpgrade the affected binaries with the following sequence:\n\n \t1) Download the VOL* files to a directory. \n\n \t2) Run the custom command, specify an install from media images,\n \t and specify the directory as the location of the images. OpenServer 5.0.7\n\n \t5.1 Location of Fixed Binaries\n\n \tftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2006.4\n\n\n \t5.2 Verification\n\n \tMD5 (VOL.000.000) = 03ed8e901780e1535c113efeba72d8cd\n\n \tmd5 is available for download from\n \t\tftp://ftp.sco.com/pub/security/tools\n\n\n \t5.3 Installing Fixed Binaries\n\n \tThe following package should be installed on your system before\n \tyou install this fix:\n\n \t\tOSR507MP4 - OpenServer 5, Release 5.0.7 Maintenance Pack 4\n\n \tUpgrade the affected binaries with the following sequence:\n\n \t1) Download the VOL* files to a directory. \n\n \t2) Run the custom command, specify an install from media images,\n \t and specify the directory as the location of the images. References\n\n \tSpecific references for this advisory:\n \t\thttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0790\n \t\thttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0791\n \t\thttp://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1060\n\n \tSCO security resources:\n \t\thttp://www.sco.com/support/security/index.html\n\n \tSCO security advisories via email\n \t\thttp://www.sco.com/support/forums/security.html\n\n \tThis security fix closes SCO incidents sr892503 fz530662\n \terg712759. Disclaimer\n\n \tSCO is not responsible for the misuse of any of the information\n \twe provide on this website and/or through our security\n \tadvisories. Our advisories are a service to our customers\n \tintended to promote secure installation and use of SCO\n \tproducts. Acknowledgments\n\n \tThe SCO Group would like to thank Fernando Gont for reporting\n \tthese issues. \nCharter: http://lists.grok.org.uk/full-disclosure-charter.html\nHosted and sponsored by Secunia - http://secunia.com/\n. This fixes some\nvulnerabilities, which can be exploited by malicious people to cause\na DoS (Denial of Service) on an active TCP session", "sources": [ { "db": "NVD", "id": "CVE-2004-0791" }, { "db": "CERT/CC", "id": "VU#415294" }, { "db": "JVNDB", "id": "JVNDB-2005-000244" }, { "db": "BID", "id": "13124" }, { "db": "PACKETSTORM", "id": "38779" }, { "db": "PACKETSTORM", "id": "38762" }, { "db": "PACKETSTORM", "id": "37143" }, { "db": "PACKETSTORM", "id": "42808" }, { "db": "PACKETSTORM", "id": "42811" } ], "trust": 3.06 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2004-0791", "trust": 3.0 }, { "db": "BID", "id": "13124", "trust": 2.7 }, { "db": "SECUNIA", "id": "18317", "trust": 1.7 }, { "db": "SREASON", "id": "19", "trust": 1.6 }, { "db": "SREASON", "id": "57", "trust": 1.6 }, { "db": "CERT/CC", "id": "VU#415294", "trust": 1.1 }, { "db": "CERT/CC", "id": "VU#222750", "trust": 1.1 }, { "db": "SECUNIA", "id": "14904", "trust": 0.9 }, { "db": "OSVDB", "id": "4030", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2005-000244", "trust": 0.8 }, { "db": "REDHAT", "id": "RHSA-2005:017", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2005:043", "trust": 0.6 }, { "db": "REDHAT", "id": "RHSA-2005:016", "trust": 0.6 }, { "db": "SCO", "id": "SCOSA-2006.4", "trust": 0.6 }, { "db": "SUNALERT", "id": "101658", "trust": 0.6 }, { "db": "SUNALERT", "id": "57746", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:1112", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:184", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:688", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:726", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:596", "trust": 0.6 }, { "db": "OVAL", "id": "OVAL:ORG.MITRE.OVAL:DEF:464", "trust": 0.6 }, { "db": "FEDORA", "id": "FLSA:157459-1", "trust": 0.6 }, { "db": "FEDORA", "id": "FLSA:157459-2", "trust": 0.6 }, { "db": "HP", "id": "HPSBUX01164", "trust": 0.6 }, { "db": "HP", "id": "HPSBTU01210", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-200504-030", "trust": 0.6 }, { "db": "USCERT", "id": "TA04-111A", "trust": 0.3 }, { "db": "PACKETSTORM", "id": "38779", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "38762", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "37143", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "42808", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "42811", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#415294" }, { "db": "BID", "id": "13124" }, { "db": "JVNDB", "id": "JVNDB-2005-000244" }, { "db": "PACKETSTORM", "id": "38779" }, { "db": "PACKETSTORM", "id": "38762" }, { "db": "PACKETSTORM", "id": "37143" }, { "db": "PACKETSTORM", "id": "42808" }, { "db": "PACKETSTORM", "id": "42811" }, { "db": "CNNVD", "id": "CNNVD-200504-030" }, { "db": "NVD", "id": "CVE-2004-0791" } ] }, "id": "VAR-200504-0003", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VARIoT devices database", "id": null } ], "trust": 0.43592494333333337 }, "last_update_date": "2024-08-14T13:05:04.830000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20050412-icmp", "trust": 0.8, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20050412-icmp.shtml" }, { "title": "HPSBUX01164", "trust": 0.8, "url": "http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00576017" }, { "title": "HPSBUX01164", "trust": 0.8, "url": "http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/HP-UX/HPSBUX01164.html" }, { "title": "IY70028", "trust": 0.8, "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY70028" }, { "title": "IY70027", "trust": 0.8, "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY70027" }, { "title": "IY70026", "trust": 0.8, "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY70026" }, { "title": "si-050517a", "trust": 0.8, "url": "https://www-06.ibm.com/jp/services/security/secinfo/si-050517a.html" }, { "title": "MS05-019", "trust": 0.8, "url": "http://www.microsoft.com/technet/security/bulletin/MS05-019.mspx" }, { "title": "RHSA-2005:043", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2005-043.html" }, { "title": "RHSA-2005:016", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2005-016.html" }, { "title": "RHSA-2005:017", "trust": 0.8, "url": "https://rhn.redhat.com/errata/RHSA-2005-017.html" }, { "title": "TCP \u5b9f\u88c5\u306e ICMP \u30a8\u30e9\u30fc\u30e1\u30c3\u30bb\u30fc\u30b8\u306e\u51e6\u7406\u306b\u95a2\u3059\u308b\u8106\u5f31\u6027", "trust": 0.8, "url": "http://www.seil.jp/seilseries/news/snote/_snote_20050727.html" }, { "title": "101658", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1" }, { "title": "101658", "trust": 0.8, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-3" }, { "title": "SYM05-008", "trust": 0.8, "url": "http://securityresponse.symantec.com/avcenter/security/Content/2005.05.02.html" }, { "title": "cisco-sa-20050412-icmp", "trust": 0.8, "url": "http://www.cisco.com/japanese/warp/public/3/jp/service/tac/707/cisco-sa-20050412-icmp-j.shtml" }, { "title": "SYM05-008", "trust": 0.8, "url": "http://www.symantec.com/region/jp/avcenter/security/content/2005.05.02.html" }, { "title": "ICMP+TCP\u306e\u8106\u5f31\u6027\u306b\u3064\u3044\u3066", "trust": 0.8, "url": "http://www.allied-telesis.co.jp/support/list/faq/vuls/20050412.html" }, { "title": "AX-VU2005-01", "trust": 0.8, "url": "http://www.alaxala.com/jp/support/security/ICMP-20050412.html" }, { "title": "HCVU000000001", "trust": 0.8, "url": "http://www.hitachi-cable.co.jp/infosystem/support/security/HCVU000000001.html" }, { "title": "MS05-019", "trust": 0.8, "url": "http://www.microsoft.com/japan/technet/security/bulletin/MS05-019.mspx" }, { "title": "RHSA-2005:043", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2005-043J.html" }, { "title": "RHSA-2005:016", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2005-016J.html" }, { "title": "RHSA-2005:017", "trust": 0.8, "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2005-017J.html" }, { "title": "\u300cTCP\u5b9f\u88c5\u306b\u304a\u3051\u308bICMP\u30a8\u30e9\u30fc\u30e1\u30c3\u30bb\u30fc\u30b8\u51e6\u7406\u306b\u95a2\u3059\u308b\u8106\u5f31\u6027\u300d\u5bfe\u7b56\u306b\u3064\u3044\u3066", "trust": 0.8, "url": "http://www.hitachi.co.jp/Prod/comp/network/notice/NISCC-532967.html" }, { "title": "TCP\u306e\u8106\u5f31\u6027\uff08NISCC Vulnerability Advisory 236929\uff09\u306b\u3064\u3044\u3066", "trust": 0.8, "url": "http://www.nec.co.jp/bnwjh/topics_001.html" }, { "title": "IX5000/IX5500\u30b7\u30ea\u30fc\u30ba TCP\u5b9f\u88c5\u306eICMP\u30a8\u30e9\u30fc\u30e1\u30c3\u30bb\u30fc\u30b8\u306e\u51e6\u7406\u306b\u95a2\u3059\u308b\u8106\u5f31\u6027\u306b\u3064\u3044\u3066\u306e\u5831\u544a", "trust": 0.8, "url": "http://www.nec.co.jp/ixseries/ix5k/tcp/tcp20050415.html" }, { "title": "\u300cTCP\u5b9f\u88c5\u306b\u304a\u3051\u308bICMP\u30a8\u30e9\u30fc\u30e1\u30c3\u30bb\u30fc\u30b8\u51e6\u7406\u306b\u95a2\u3059\u308b\u8106\u5f31\u6027\u306b\u3064\u3044\u3066\u300d", "trust": 0.8, "url": "http://www.nec.co.jp/ip88n/icmp.html" }, { "title": "ICMP\u4f7f\u7528\u6642\u306bTCP\u30bb\u30c3\u30b7\u30e7\u30f3\u304c\u963b\u5bb3\u3055\u308c\u308b\u8106\u5f31\u6027\u306b\u95a2\u3059\u308b\u5bfe\u5fdc\u306b\u3064\u3044\u3066", "trust": 0.8, "url": "http://fenics.fujitsu.com/products/support/2006/icmp_0119.html" }, { "title": "532967/NISCC/ICMP", "trust": 0.8, "url": "http://software.fujitsu.com/jp/security/vulnerabilities/niscc532967.html" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2005-000244" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-Other", "trust": 1.0 } ], "sources": [ { "db": "NVD", "id": "CVE-2004-0791" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.4, "url": "http://www.securityfocus.com/bid/13124" }, { "trust": 1.9, "url": "http://www.watersprings.org/pub/id/draft-gont-tcpm-icmp-attacks-03.txt" }, { "trust": 1.9, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57746-1" }, { "trust": 1.7, "url": "http://www.gont.com.ar/drafts/icmp-attacks-against-tcp.html" }, { "trust": 1.6, "url": "http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?lang=en" }, { "trust": 1.6, "url": "http://www.redhat.com/support/errata/rhsa-2005-043.html" }, { "trust": 1.6, "url": "http://www.redhat.com/support/errata/rhsa-2005-017.html" }, { "trust": 1.6, "url": "http://www.redhat.com/support/errata/rhsa-2005-016.html" }, { "trust": 1.6, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1" }, { "trust": 1.6, "url": "http://securityreason.com/securityalert/57" }, { "trust": 1.6, "url": "http://securityreason.com/securityalert/19" }, { "trust": 1.6, "url": "http://secunia.com/advisories/18317" }, { "trust": 1.6, "url": "ftp://ftp.sco.com/pub/updates/openserver/scosa-2006.4/scosa-2006.4.txt" }, { "trust": 1.1, "url": "http://www.kb.cert.org/vuls/id/222750" }, { "trust": 1.0, "url": "http://secunia.com/advisories/14904/" }, { "trust": 1.0, "url": "http://marc.info/?l=bugtraq\u0026m=112861397904255\u0026w=2" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/418882/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/428028/100/0/threaded" }, { "trust": 1.0, "url": "http://www.securityfocus.com/archive/1/428058/100/0/threaded" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a10228" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a1112" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a184" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a464" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a596" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a688" }, { "trust": 1.0, "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a726" }, { "trust": 0.9, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2004-0791" }, { "trust": 0.8, "url": "http://www.uniras.gov.uk/niscc/docs/al-20040420-00199.html?lang=en" }, { "trust": 0.8, "url": "http://www.niscc.gov.uk/niscc/docs/re-20040420-00391.pdf" }, { "trust": 0.8, "url": "http://www.ietf.org/rfc/rfc3562.txt" }, { "trust": 0.8, "url": "http://www.ietf.org/rfc/rfc2385.txt" }, { "trust": 0.8, "url": "http://www.ietf.org/rfc/rfc1323.txt" }, { "trust": 0.8, "url": "http://www.osvdb.org/displayvuln.php?osvdb_id=4030" }, { "trust": 0.8, "url": "http://www.ciac.org/ciac/bulletins/p-177.shtml" }, { "trust": 0.8, "url": "http://www.cpni.gov.uk/products/vulnerabilitydisclosures/default.aspx?id=va-20050412-00303.xml" }, { "trust": 0.8, "url": "http://www.frsirt.com/english/advisories/2005/0344" }, { "trust": 0.8, "url": "http://tools.ietf.org/html/draft-gont-tcpm-icmp-attacks-03" }, { "trust": 0.8, "url": "http://www.ipa.go.jp/security/ciadr/vul/20050413-ms05-019.html" }, { "trust": 0.8, "url": "http://jvn.jp/niscc/niscc-532967/index.html" }, { "trust": 0.8, "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2004-0791" }, { "trust": 0.8, "url": "http://www.cpni.gov.uk/docs/re-20050412-00303.pdf?lang=en" }, { "trust": 0.8, "url": "http://www.cyberpolice.go.jp/important/2005/20050414_195834.html" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/428058/100/0/threaded" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/428028/100/0/threaded" }, { "trust": 0.6, "url": "http://www.securityfocus.com/archive/1/archive/1/418882/100/0/threaded" }, { "trust": 0.6, "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=112861397904255\u0026w=2" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:726" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:688" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:596" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:464" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:184" }, { "trust": 0.6, "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:1112" }, { "trust": 0.3, "url": "http://www130.nortelnetworks.com/cgi-bin/eserv/cs/main.jsp?level=6\u0026category=29\u0026subcategory=1\u0026subtype=\u0026documentoid=326515" }, { "trust": 0.3, "url": "http://support.avaya.com/elmodocs2/security/asa-2006-217.htm" }, { "trust": 0.3, "url": "http://www.alaxala.com/jp/support/icmp-20050412.html" }, { "trust": 0.3, "url": "http://www.f5.com/f5products/bigip/" }, { "trust": 0.3, "url": "http://www.cisco.com/en/us/products/products_security_advisory09186a0080436587.shtml" }, { "trust": 0.3, "url": "http://archives.neohapsis.com/archives/openbsd/cvs/2005-06/0889.html" }, { "trust": 0.3, "url": "http://archives.neohapsis.com/archives/openbsd/cvs/2005-05/0773.html" }, { "trust": 0.3, "url": "http://www.cymru.com/documents/icmp-messages.html" }, { "trust": 0.3, "url": "http://www-1.ibm.com/support/docview.wss?rs=118\u0026uid=isg1iy70026" }, { "trust": 0.3, "url": "http://www.microsoft.com/technet/security/bulletin/ms05-019.mspx" }, { "trust": 0.3, "url": "http://www.microsoft.com/technet/security/bulletin/ms06-064.mspx" }, { "trust": 0.3, "url": "http://www.niscc.gov.uk/niscc/docs/re-20050412-00303.pdf?lang=en" }, { "trust": 0.3, "url": "http://www.openbsd.org/38.html" }, { "trust": 0.3, "url": "http://rhn.redhat.com/errata/rhsa-2005-043.html" }, { "trust": 0.3, "url": "http://www.bluecoat.com/support/knowledge/advisory_icmp_error_message_vulnerabilities.html" }, { "trust": 0.3, "url": "http://tech.f5.com/home/bigip/solutions/advisories/sol4583.html" }, { "trust": 0.3, "url": "http://tech.f5.com/home/bigip-next/solutions/advisories/sol4584.html" }, { "trust": 0.3, "url": "http://www2.itrc.hp.com/service/cki/docdisplay.do?docid=hpsbtu01210" }, { "trust": 0.3, "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-101658-1\u0026searchclause=2" }, { "trust": 0.3, "url": "http://securityresponse.symantec.com/avcenter/security/content/2005.05.02.html" }, { "trust": 0.3, "url": "http://www.us-cert.gov/cas/techalerts/ta04-111a.html" }, { "trust": 0.3, "url": "http://www.sco.com/support/update/download/release.php?rid=58" }, { "trust": 0.3, "url": "http://www.kb.cert.org/vuls/id/415294" }, { "trust": 0.3, "url": "/archive/1/404535" }, { "trust": 0.3, "url": "/archive/1/406296" }, { "trust": 0.3, "url": "/archive/1/405764" }, { "trust": 0.3, "url": "/archive/1/405771" }, { "trust": 0.2, "url": "http://h30046.www3.hp.com/driveralertprofile.php?regioncode=na\u0026" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0790" }, { "trust": 0.2, "url": "http://itrc.hp.com/service/cki/secbullarchive.do" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-0791" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2004-1060" }, { "trust": 0.2, "url": "http://h30046.www3.hp.com/subsignin.php" }, { "trust": 0.2, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.2, "url": "http://secunia.com/about_secunia_advisories/" }, { "trust": 0.2, "url": "http://secunia.com/secunia_security_advisories/" }, { "trust": 0.1, "url": "http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/" }, { "trust": 0.1, "url": "http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=can-2004-1060\u003e" }, { "trust": 0.1, "url": "http://www.uniras.gov.uk/niscc/docs/al-20050412-00308.html?" }, { "trust": 0.1, "url": "http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=can-2004-0790\u003e" }, { "trust": 0.1, "url": "http://www.hp.com/go/softwaredepot\u003e." }, { "trust": 0.1, "url": "http://itrc.hp.com\u003e." }, { "trust": 0.1, "url": "http://www.ietf.org/internet-drafts/" }, { "trust": 0.1, "url": "http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=can-2004-0791\u003e" }, { "trust": 0.1, "url": "http://www.itrc.hp.com/service/patch/mainpage.do" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2001-0328" }, { "trust": 0.1, "url": "http://www.itrc.hp.com/service/patch/patchdetail.do?" }, { "trust": 0.1, "url": "http://www.itrc.hp.com/service/patch/mainpage" }, { "trust": 0.1, "url": "http://secunia.com/product/1507/" }, { "trust": 0.1, "url": "http://www.ietf.org/rfc/rfc1191.txt" }, { "trust": 0.1, "url": "http://secunia.com/product/56/" }, { "trust": 0.1, "url": "http://secunia.com/product/182/" }, { "trust": 0.1, "url": "http://secunia.com/product/50/" }, { "trust": 0.1, "url": "http://www.niscc.gov.uk/niscc/docs/al-20050412-00308.html" }, { "trust": 0.1, "url": "http://secunia.com/product/184/" }, { "trust": 0.1, "url": "http://secunia.com/product/4907/" }, { "trust": 0.1, "url": "http://www.ietf.org/rfc/rfc1122.txt" }, { "trust": 0.1, "url": "http://secunia.com/product/684/" }, { "trust": 0.1, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20050412-icmp.shtml" }, { "trust": 0.1, "url": "http://www.cisco.com/warp/public/707/cisco-sa-20050412-icmp.shtml#software" }, { "trust": 0.1, "url": "http://secunia.com/secunia_vacancies/" }, { "trust": 0.1, "url": "http://secunia.com/product/183/" }, { "trust": 0.1, "url": "http://secunia.com/product/2270/" }, { "trust": 0.1, "url": "http://secunia.com/product/53/" }, { "trust": 0.1, "url": "http://secunia.com/product/3214/" }, { "trust": 0.1, "url": "http://www.sco.com/support/security/index.html" }, { "trust": 0.1, "url": "http://secunia.com/" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2004-0790" }, { "trust": 0.1, "url": "http://www.sco.com/support/forums/security.html" }, { "trust": 0.1, "url": "http://lists.grok.org.uk/full-disclosure-charter.html" }, { "trust": 0.1, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2004-1060" }, { "trust": 0.1, "url": "http://secunia.com/advisories/18317/" }, { "trust": 0.1, "url": "http://secunia.com/product/137/" } ], "sources": [ { "db": "CERT/CC", "id": "VU#415294" }, { "db": "BID", "id": "13124" }, { "db": "JVNDB", "id": "JVNDB-2005-000244" }, { "db": "PACKETSTORM", "id": "38779" }, { "db": "PACKETSTORM", "id": "38762" }, { "db": "PACKETSTORM", "id": "37143" }, { "db": "PACKETSTORM", "id": "42808" }, { "db": "PACKETSTORM", "id": "42811" }, { "db": "CNNVD", "id": "CNNVD-200504-030" }, { "db": "NVD", "id": "CVE-2004-0791" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#415294" }, { "db": "BID", "id": "13124" }, { "db": "JVNDB", "id": "JVNDB-2005-000244" }, { "db": "PACKETSTORM", "id": "38779" }, { "db": "PACKETSTORM", "id": "38762" }, { "db": "PACKETSTORM", "id": "37143" }, { "db": "PACKETSTORM", "id": "42808" }, { "db": "PACKETSTORM", "id": "42811" }, { "db": "CNNVD", "id": "CNNVD-200504-030" }, { "db": "NVD", "id": "CVE-2004-0791" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2004-04-20T00:00:00", "db": "CERT/CC", "id": "VU#415294" }, { "date": "2005-04-12T00:00:00", "db": "BID", "id": "13124" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2005-000244" }, { "date": "2005-07-20T07:23:12", "db": "PACKETSTORM", "id": "38779" }, { "date": "2005-07-19T14:36:44", "db": "PACKETSTORM", "id": "38762" }, { "date": "2005-04-18T07:21:17", "db": "PACKETSTORM", "id": "37143" }, { "date": "2006-01-05T02:07:56", "db": "PACKETSTORM", "id": "42808" }, { "date": "2006-01-05T16:28:15", "db": "PACKETSTORM", "id": "42811" }, { "date": "2005-04-12T00:00:00", "db": "CNNVD", "id": "CNNVD-200504-030" }, { "date": "2005-04-12T04:00:00", "db": "NVD", "id": "CVE-2004-0791" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2006-05-01T00:00:00", "db": "CERT/CC", "id": "VU#415294" }, { "date": "2006-12-08T19:54:00", "db": "BID", "id": "13124" }, { "date": "2007-04-01T00:00:00", "db": "JVNDB", "id": "JVNDB-2005-000244" }, { "date": "2005-10-28T00:00:00", "db": "CNNVD", "id": "CNNVD-200504-030" }, { "date": "2018-10-30T16:26:22.763000", "db": "NVD", "id": "CVE-2004-0791" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "PACKETSTORM", "id": "38762" }, { "db": "PACKETSTORM", "id": "42808" }, { "db": "CNNVD", "id": "CNNVD-200504-030" } ], "trust": 0.8 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "The Border Gateway Protocol relies on persistent TCP sessions without specifying authentication requirements", "sources": [ { "db": "CERT/CC", "id": "VU#415294" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-200504-030" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.