Action not permitted
Modal body text goes here.
CVE-2005-2801
Vulnerability from cvelistv5
Published
2005-09-06 04:00
Modified
2024-08-07 22:45
Severity ?
EPSS score ?
Summary
xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6 does not properly compare the name_index fields when sharing xattr blocks, which could prevent default ACLs from being applied.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:45:02.249Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "18056", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18056" }, { "name": "17073", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17073" }, { "name": "RHSA-2006:0144", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0144.html" }, { "name": "SUSE-SA:2005:018", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://www.novell.com/linux/security/advisories/2005_18_kernel.html" }, { "name": "oval:org.mitre.oval:def:10495", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10495" }, { "name": "18059", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/18059" }, { "name": "[Acl-Devel] 20050205 [FIX] Long-standing xattr sharing bug", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://acl.bestbits.at/pipermail/acl-devel/2005-February/001848.html" }, { "name": "[debian-kernel] 20050809 Re: ACL patches in Debian 2.4 series kernel.", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://lists.debian.org/debian-kernel/2005/08/msg00238.html" }, { "name": "DSA-922", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-922" }, { "name": "DSA-921", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2005/dsa-921" }, { "name": "RHSA-2005:514", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-514.html" }, { "name": "17826", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/17826" }, { "name": "FLSA:157459-3", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/427980/100/0/threaded" }, { "name": "MDKSA-2005:219", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219" }, { "name": "14793", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/14793" }, { "name": "19252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/19252" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2005-02-05T00:00:00", "descriptions": [ { "lang": "en", "value": "xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6 does not properly compare the name_index fields when sharing xattr blocks, which could prevent default ACLs from being applied." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "18056", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18056" }, { "name": "17073", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17073" }, { "name": "RHSA-2006:0144", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0144.html" }, { "name": "SUSE-SA:2005:018", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://www.novell.com/linux/security/advisories/2005_18_kernel.html" }, { "name": "oval:org.mitre.oval:def:10495", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10495" }, { "name": "18059", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/18059" }, { "name": "[Acl-Devel] 20050205 [FIX] Long-standing xattr sharing bug", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://acl.bestbits.at/pipermail/acl-devel/2005-February/001848.html" }, { "name": "[debian-kernel] 20050809 Re: ACL patches in Debian 2.4 series kernel.", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://lists.debian.org/debian-kernel/2005/08/msg00238.html" }, { "name": "DSA-922", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-922" }, { "name": "DSA-921", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2005/dsa-921" }, { "name": "RHSA-2005:514", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-514.html" }, { "name": "17826", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/17826" }, { "name": "FLSA:157459-3", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "http://www.securityfocus.com/archive/1/427980/100/0/threaded" }, { "name": "MDKSA-2005:219", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219" }, { "name": "14793", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/14793" }, { "name": "19252", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/19252" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2801", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6 does not properly compare the name_index fields when sharing xattr blocks, which could prevent default ACLs from being applied." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "18056", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18056" }, { "name": "17073", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17073" }, { "name": "RHSA-2006:0144", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0144.html" }, { "name": "SUSE-SA:2005:018", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2005_18_kernel.html" }, { "name": "oval:org.mitre.oval:def:10495", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10495" }, { "name": "18059", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18059" }, { "name": "[Acl-Devel] 20050205 [FIX] Long-standing xattr sharing bug", "refsource": "MLIST", "url": "http://acl.bestbits.at/pipermail/acl-devel/2005-February/001848.html" }, { "name": "[debian-kernel] 20050809 Re: ACL patches in Debian 2.4 series kernel.", "refsource": "MLIST", "url": "http://lists.debian.org/debian-kernel/2005/08/msg00238.html" }, { "name": "DSA-922", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-922" }, { "name": "DSA-921", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-921" }, { "name": "RHSA-2005:514", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-514.html" }, { "name": "17826", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17826" }, { "name": "FLSA:157459-3", "refsource": "FEDORA", "url": "http://www.securityfocus.com/archive/1/427980/100/0/threaded" }, { "name": "MDKSA-2005:219", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219" }, { "name": "14793", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14793" }, { "name": "19252", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19252" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2801", "datePublished": "2005-09-06T04:00:00", "dateReserved": "2005-09-06T00:00:00", "dateUpdated": "2024-08-07T22:45:02.249Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2005-2801\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2005-09-06T17:03:00.000\",\"lastModified\":\"2024-11-21T00:00:27.923\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6 does not properly compare the name_index fields when sharing xattr blocks, which could prevent default ACLs from being applied.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-697\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142BCD48-8387-4D0C-A052-44DD4144CBFF\"}]}]}],\"references\":[{\"url\":\"http://acl.bestbits.at/pipermail/acl-devel/2005-February/001848.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Exploit\"]},{\"url\":\"http://lists.debian.org/debian-kernel/2005/08/msg00238.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"http://secunia.com/advisories/17073\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/17826\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/18056\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/18059\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/19252\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.debian.org/security/2005/dsa-921\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2005/dsa-922\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:219\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2005_18_kernel.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-514.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0144.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/archive/1/427980/100/0/threaded\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/14793\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10495\",\"source\":\"cve@mitre.org\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://acl.bestbits.at/pipermail/acl-devel/2005-February/001848.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Exploit\"]},{\"url\":\"http://lists.debian.org/debian-kernel/2005/08/msg00238.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\"]},{\"url\":\"http://secunia.com/advisories/17073\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/17826\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/18056\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/18059\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://secunia.com/advisories/19252\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.debian.org/security/2005/dsa-921\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2005/dsa-922\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2005:219\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.novell.com/linux/security/advisories/2005_18_kernel.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2005-514.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2006-0144.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]},{\"url\":\"http://www.securityfocus.com/archive/1/427980/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securityfocus.com/bid/14793\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10495\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Broken Link\"]}]}}" } }
rhsa-2006_0144
Vulnerability from csaf_redhat
Published
2006-03-15 14:05
Modified
2024-11-22 00:09
Summary
Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 7
Notes
Topic
Updated kernel packages are now available as part of ongoing support and
maintenance of Red Hat Enterprise Linux version 3. This is the seventh
regular update.
This security advisory has been rated as having moderate security impact
by the Red Hat Security Response Team.
Details
The Linux kernel handles the basic functions of the operating system.
This is the seventh regular kernel update to Red Hat Enterprise Linux 3.
New features introduced by this update include:
- addition of the bnx2, dell_rbu, and megaraid_sas device drivers
- support for multi-core, multi-threaded Intel Itanium processors
- upgrade of the SATA subsystem to include ATAPI and SMART support
- optional tuning via the new numa_memory_allocator, arp_announce,
and printk_ratelimit sysctls
There were many bug fixes in various parts of the kernel. The ongoing
effort to resolve these problems has resulted in a marked improvement in
the reliability and scalability of Red Hat Enterprise Linux 3.
There were numerous driver updates and security fixes (elaborated below).
Other key areas affected by fixes in this update include the networking
subsystem, the VM subsystem, NPTL handling, autofs4, the USB subsystem,
CPU enumeration, and 32-bit-exec-mode handling on 64-bit architectures.
The following device drivers have been upgraded to new versions:
aacraid -------- 1.1.5-2412
bnx2 ----------- 1.4.30 (new)
dell_rbu ------- 2.1 (new)
e1000 ---------- 6.1.16-k3
emulex --------- 7.3.3
fusion --------- 2.06.16.02
ipmi ----------- 35.11
megaraid2 ------ v2.10.10.1
megaraid_sas --- 00.00.02.00 (new)
tg3 ------------ 3.43RH
The following security bugs were fixed in this update:
- a flaw in gzip/zlib handling internal to the kernel that allowed
a local user to cause a denial of service (crash)
(CVE-2005-2458,low)
- a flaw in ext3 EA/ACL handling of attribute sharing that allowed
a local user to gain privileges (CVE-2005-2801, moderate)
- a minor info leak with the get_thread_area() syscall that allowed
a local user to view uninitialized kernel stack data
(CVE-2005-3276, low)
Note: The kernel-unsupported package contains various drivers and modules
that are unsupported and therefore might contain security problems that
have not been addressed.
All Red Hat Enterprise Linux 3 users are advised to upgrade their
kernels to the packages associated with their machine architectures
and configurations as listed in this erratum.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages are now available as part of ongoing support and\nmaintenance of Red Hat Enterprise Linux version 3. This is the seventh\nregular update.\n\nThis security advisory has been rated as having moderate security impact\nby the Red Hat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThis is the seventh regular kernel update to Red Hat Enterprise Linux 3.\n\nNew features introduced by this update include:\n\n - addition of the bnx2, dell_rbu, and megaraid_sas device drivers\n - support for multi-core, multi-threaded Intel Itanium processors\n - upgrade of the SATA subsystem to include ATAPI and SMART support\n - optional tuning via the new numa_memory_allocator, arp_announce,\n and printk_ratelimit sysctls\n\nThere were many bug fixes in various parts of the kernel. The ongoing\neffort to resolve these problems has resulted in a marked improvement in\nthe reliability and scalability of Red Hat Enterprise Linux 3.\n\nThere were numerous driver updates and security fixes (elaborated below).\nOther key areas affected by fixes in this update include the networking\nsubsystem, the VM subsystem, NPTL handling, autofs4, the USB subsystem,\nCPU enumeration, and 32-bit-exec-mode handling on 64-bit architectures.\n\nThe following device drivers have been upgraded to new versions:\n\n aacraid -------- 1.1.5-2412\n bnx2 ----------- 1.4.30 (new)\n dell_rbu ------- 2.1 (new)\n e1000 ---------- 6.1.16-k3\n emulex --------- 7.3.3\n fusion --------- 2.06.16.02\n ipmi ----------- 35.11\n megaraid2 ------ v2.10.10.1\n megaraid_sas --- 00.00.02.00 (new)\n tg3 ------------ 3.43RH\n\nThe following security bugs were fixed in this update:\n\n - a flaw in gzip/zlib handling internal to the kernel that allowed\n a local user to cause a denial of service (crash)\n (CVE-2005-2458,low)\n\n - a flaw in ext3 EA/ACL handling of attribute sharing that allowed\n a local user to gain privileges (CVE-2005-2801, moderate)\n\n - a minor info leak with the get_thread_area() syscall that allowed\n a local user to view uninitialized kernel stack data\n (CVE-2005-3276, low)\n\nNote: The kernel-unsupported package contains various drivers and modules\nthat are unsupported and therefore might contain security problems that\nhave not been addressed.\n\nAll Red Hat Enterprise Linux 3 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2006:0144", "url": "https://access.redhat.com/errata/RHSA-2006:0144" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "112004", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=112004" }, { "category": "external", "summary": "112066", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=112066" }, { "category": "external", "summary": "117067", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=117067" }, { "category": "external", "summary": "122256", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=122256" }, { "category": "external", "summary": "125642", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=125642" }, { "category": "external", "summary": "128015", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=128015" }, { "category": "external", "summary": "129265", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=129265" }, { "category": "external", "summary": "130387", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=130387" }, { "category": "external", "summary": "130489", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=130489" }, { "category": "external", "summary": "130712", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=130712" }, { "category": "external", "summary": "131295", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=131295" }, { "category": "external", "summary": "132547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=132547" }, { "category": "external", "summary": "134506", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134506" }, { "category": "external", "summary": "136583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=136583" }, { "category": "external", "summary": "137101", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137101" }, { "category": "external", "summary": "137344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137344" }, { "category": "external", "summary": "137998", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137998" }, { "category": "external", "summary": "138730", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=138730" }, { "category": "external", "summary": "142579", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142579" }, { "category": "external", "summary": "144033", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144033" }, { "category": "external", "summary": "145596", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=145596" }, { "category": "external", "summary": "146663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=146663" }, { "category": "external", "summary": "147870", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=147870" }, { "category": "external", "summary": "150559", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=150559" }, { "category": "external", "summary": "152103", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152103" }, { "category": "external", "summary": "152650", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152650" }, { "category": "external", "summary": "154028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=154028" }, { "category": "external", "summary": "154385", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=154385" }, { "category": "external", "summary": "156396", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156396" }, { "category": "external", "summary": "156397", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156397" }, { "category": "external", "summary": "156645", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156645" }, { "category": "external", "summary": "156987", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156987" }, { "category": "external", "summary": "156988", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156988" }, { "category": "external", "summary": "156999", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156999" }, { "category": "external", "summary": "157006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=157006" }, { "category": "external", "summary": "158819", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158819" }, { "category": "external", "summary": "158821", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158821" }, { "category": "external", "summary": "159326", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159326" }, { "category": "external", "summary": "159523", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159523" }, { "category": "external", "summary": "159874", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159874" }, { "category": "external", "summary": "159977", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159977" }, { "category": "external", "summary": "160009", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160009" }, { "category": "external", "summary": "160337", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160337" }, { "category": "external", "summary": "160539", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160539" }, { "category": "external", "summary": "161056", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161056" }, { "category": "external", "summary": "161160", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161160" }, { "category": "external", "summary": "161188", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161188" }, { "category": "external", "summary": "161336", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161336" }, { "category": "external", "summary": "161866", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161866" }, { "category": "external", "summary": "161875", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161875" }, { "category": "external", "summary": "162065", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162065" }, { "category": "external", "summary": "162212", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162212" }, { "category": "external", "summary": "162271", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162271" }, { "category": "external", "summary": "162417", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162417" }, { "category": "external", "summary": "162683", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162683" }, { "category": "external", "summary": "162735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162735" }, { "category": "external", "summary": "163176", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163176" }, { "category": "external", "summary": "163184", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163184" }, { "category": "external", "summary": "163239", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163239" }, { "category": "external", "summary": "163307", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163307" }, { "category": "external", "summary": "163381", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163381" }, { "category": "external", "summary": "163901", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163901" }, { "category": "external", "summary": "163929", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163929" }, { "category": "external", "summary": "164206", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164206" }, { "category": "external", "summary": "164304", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164304" }, { "category": "external", "summary": "164438", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164438" }, { "category": "external", "summary": "164580", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164580" }, { "category": "external", "summary": "164795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164795" }, { "category": "external", "summary": "164828", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164828" }, { "category": "external", "summary": "165006", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165006" }, { "category": "external", "summary": "165119", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165119" }, { "category": "external", "summary": "165364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165364" }, { "category": "external", "summary": "165412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165412" }, { "category": "external", "summary": "165453", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165453" }, { "category": "external", "summary": "165475", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165475" }, { "category": "external", "summary": "165680", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165680" }, { "category": "external", "summary": "165825", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165825" }, { "category": "external", "summary": "165989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165989" }, { "category": "external", "summary": "166345", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166345" }, { "category": "external", "summary": "166363", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166363" }, { "category": "external", "summary": "166364", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166364" }, { "category": "external", "summary": "166578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166578" }, { "category": "external", "summary": "166583", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166583" }, { "category": "external", "summary": "166600", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166600" }, { "category": "external", "summary": "166669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166669" }, { "category": "external", "summary": "167674", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167674" }, { "category": "external", "summary": "167800", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167800" }, { "category": "external", "summary": "167942", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167942" }, { "category": "external", "summary": "168226", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168226" }, { "category": "external", "summary": "168293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168293" }, { "category": "external", "summary": "168315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168315" }, { "category": "external", "summary": "168358", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168358" }, { "category": "external", "summary": "168359", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168359" }, { "category": "external", "summary": "168390", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168390" }, { "category": "external", "summary": "168392", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168392" }, { "category": "external", "summary": "168474", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168474" }, { "category": "external", "summary": "168541", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168541" }, { "category": "external", "summary": "168581", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168581" }, { "category": "external", "summary": "168597", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168597" }, { "category": "external", "summary": "168603", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168603" }, { "category": "external", "summary": "168681", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168681" }, { "category": "external", "summary": "168780", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168780" }, { "category": "external", "summary": "168795", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168795" }, { "category": "external", "summary": "168896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=168896" }, { "category": "external", "summary": "169230", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=169230" }, { "category": "external", "summary": "169294", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=169294" }, { "category": "external", "summary": "169393", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=169393" }, { "category": "external", "summary": "169511", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=169511" }, { "category": "external", "summary": "169662", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=169662" }, { "category": "external", "summary": "169992", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=169992" }, { "category": "external", "summary": "170429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170429" }, { "category": "external", "summary": "170440", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170440" }, { "category": "external", "summary": "170446", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170446" }, { "category": "external", "summary": "170529", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170529" }, { "category": "external", "summary": "170561", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170561" }, { "category": "external", "summary": "170633", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=170633" }, { "category": "external", "summary": "171129", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=171129" }, { "category": "external", "summary": "171377", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=171377" }, { "category": "external", "summary": "172233", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=172233" }, { "category": "external", "summary": "172334", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=172334" }, { "category": "external", "summary": "172664", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=172664" }, { "category": "external", "summary": "173280", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=173280" }, { "category": "external", "summary": "174005", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=174005" }, { "category": "external", "summary": "175017", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=175017" }, { "category": "external", "summary": "175154", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=175154" }, { "category": "external", "summary": "175211", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=175211" }, { "category": "external", "summary": "175365", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=175365" }, { "category": "external", "summary": "175624", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=175624" }, { "category": "external", "summary": "175625", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=175625" }, { "category": "external", "summary": "175767", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=175767" }, { "category": "external", "summary": "176264", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=176264" }, { "category": "external", "summary": "177023", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=177023" }, { "category": "external", "summary": "177573", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=177573" }, { "category": "external", "summary": "177691", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=177691" }, { "category": "external", "summary": "179168", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=179168" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2006/rhsa-2006_0144.json" } ], "title": "Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 3 Update 7", "tracking": { "current_release_date": "2024-11-22T00:09:41+00:00", "generator": { "date": "2024-11-22T00:09:41+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2006:0144", "initial_release_date": "2006-03-15T14:05:00+00:00", "revision_history": [ { "date": "2006-03-15T14:05:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2006-03-15T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:09:41+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 3", "product": { "name": "Red Hat Enterprise Linux AS version 3", "product_id": "3AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::as" } } }, { "category": "product_name", "name": "Red Hat Desktop version 3", "product": { "name": "Red Hat Desktop version 3", "product_id": "3Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 3", "product": { "name": "Red Hat Enterprise Linux ES version 3", "product_id": "3ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 3", "product": { "name": "Red Hat Enterprise Linux WS version 3", "product_id": "3WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:3::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-BOOT-0:2.4.21-40.EL.i386", "product": { "name": "kernel-BOOT-0:2.4.21-40.EL.i386", "product_id": "kernel-BOOT-0:2.4.21-40.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-BOOT@2.4.21-40.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-40.EL.i386", "product": { "name": "kernel-source-0:2.4.21-40.EL.i386", "product_id": "kernel-source-0:2.4.21-40.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-40.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.i386", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i386", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=i386" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-40.EL.i386", "product": { "name": "kernel-doc-0:2.4.21-40.EL.i386", "product_id": "kernel-doc-0:2.4.21-40.EL.i386", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-40.EL?arch=i386" } } } ], "category": "architecture", "name": "i386" }, { "branches": [ { "category": "product_version", "name": "kernel-hugemem-0:2.4.21-40.EL.i686", "product": { "name": "kernel-hugemem-0:2.4.21-40.EL.i686", "product_id": "kernel-hugemem-0:2.4.21-40.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.4.21-40.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.i686", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.i686", "product_id": "kernel-unsupported-0:2.4.21-40.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-40.EL.i686", "product": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.i686", "product_id": "kernel-smp-unsupported-0:2.4.21-40.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-40.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "product": { "name": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "product_id": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-unsupported@2.4.21-40.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.i686", "product": { "name": "kernel-0:2.4.21-40.EL.i686", "product_id": "kernel-0:2.4.21-40.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.i686", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i686", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-40.EL.i686", "product": { "name": "kernel-smp-0:2.4.21-40.EL.i686", "product_id": "kernel-smp-0:2.4.21-40.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-40.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.athlon", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.athlon", "product_id": "kernel-unsupported-0:2.4.21-40.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "product": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "product_id": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-40.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.athlon", "product": { "name": "kernel-0:2.4.21-40.EL.athlon", "product_id": "kernel-0:2.4.21-40.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.athlon", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.athlon", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=athlon" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-40.EL.athlon", "product": { "name": "kernel-smp-0:2.4.21-40.EL.athlon", "product_id": "kernel-smp-0:2.4.21-40.EL.athlon", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-40.EL?arch=athlon" } } } ], "category": "architecture", "name": "athlon" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.ia64", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia64", "product_id": "kernel-unsupported-0:2.4.21-40.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.ia64", "product": { "name": "kernel-0:2.4.21-40.EL.ia64", "product_id": "kernel-0:2.4.21-40.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-40.EL.ia64", "product": { "name": "kernel-source-0:2.4.21-40.EL.ia64", "product_id": "kernel-source-0:2.4.21-40.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-40.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia64", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-40.EL.ia64", "product": { "name": "kernel-doc-0:2.4.21-40.EL.ia64", "product_id": "kernel-doc-0:2.4.21-40.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-40.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.ia32e", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia32e", "product_id": "kernel-unsupported-0:2.4.21-40.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.ia32e", "product": { "name": "kernel-0:2.4.21-40.EL.ia32e", "product_id": "kernel-0:2.4.21-40.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=ia32e" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.ia32e", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia32e", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.ia32e", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=ia32e" } } } ], "category": "architecture", "name": "ia32e" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.x86_64", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.x86_64", "product_id": "kernel-unsupported-0:2.4.21-40.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "product": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "product_id": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-unsupported@2.4.21-40.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.x86_64", "product": { "name": "kernel-0:2.4.21-40.EL.x86_64", "product_id": "kernel-0:2.4.21-40.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-40.EL.x86_64", "product": { "name": "kernel-source-0:2.4.21-40.EL.x86_64", "product_id": "kernel-source-0:2.4.21-40.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-40.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.x86_64", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.4.21-40.EL.x86_64", "product": { "name": "kernel-smp-0:2.4.21-40.EL.x86_64", "product_id": "kernel-smp-0:2.4.21-40.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.4.21-40.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-40.EL.x86_64", "product": { "name": "kernel-doc-0:2.4.21-40.EL.x86_64", "product_id": "kernel-doc-0:2.4.21-40.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-40.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.src", "product": { "name": "kernel-0:2.4.21-40.EL.src", "product_id": "kernel-0:2.4.21-40.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.s390x", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390x", "product_id": "kernel-unsupported-0:2.4.21-40.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.s390x", "product": { "name": "kernel-0:2.4.21-40.EL.s390x", "product_id": "kernel-0:2.4.21-40.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-40.EL.s390x", "product": { "name": "kernel-source-0:2.4.21-40.EL.s390x", "product_id": "kernel-source-0:2.4.21-40.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-40.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390x", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-40.EL.s390x", "product": { "name": "kernel-doc-0:2.4.21-40.EL.s390x", "product_id": "kernel-doc-0:2.4.21-40.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-40.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.s390", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390", "product_id": "kernel-unsupported-0:2.4.21-40.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.s390", "product": { "name": "kernel-0:2.4.21-40.EL.s390", "product_id": "kernel-0:2.4.21-40.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-source-0:2.4.21-40.EL.s390", "product": { "name": "kernel-source-0:2.4.21-40.EL.s390", "product_id": "kernel-source-0:2.4.21-40.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-40.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.s390", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-40.EL.s390", "product": { "name": "kernel-doc-0:2.4.21-40.EL.s390", "product_id": "kernel-doc-0:2.4.21-40.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-40.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "product_id": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.ppc64pseries", "product": { "name": "kernel-0:2.4.21-40.EL.ppc64pseries", "product_id": "kernel-0:2.4.21-40.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=ppc64pseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=ppc64pseries" } } } ], "category": "architecture", "name": "ppc64pseries" }, { "branches": [ { "category": "product_version", "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "product": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "product_id": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-unsupported@2.4.21-40.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.4.21-40.EL.ppc64iseries", "product": { "name": "kernel-0:2.4.21-40.EL.ppc64iseries", "product_id": "kernel-0:2.4.21-40.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.4.21-40.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-source-0:2.4.21-40.EL.ppc64", "product": { "name": "kernel-source-0:2.4.21-40.EL.ppc64", "product_id": "kernel-source-0:2.4.21-40.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-source@2.4.21-40.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64", "product_id": "kernel-debuginfo-0:2.4.21-40.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.4.21-40.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-doc-0:2.4.21-40.EL.ppc64", "product": { "name": "kernel-doc-0:2.4.21-40.EL.ppc64", "product_id": "kernel-doc-0:2.4.21-40.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.4.21-40.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.src as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.src" }, "product_reference": "kernel-0:2.4.21-40.EL.src", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-BOOT-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-doc-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-source-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 3", "product_id": "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.src as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.src" }, "product_reference": "kernel-0:2.4.21-40.EL.src", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-40.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-40.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.i386 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.ppc64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.athlon as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia32e as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390x as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.x86_64 as a component of Red Hat Desktop version 3", "product_id": "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.src as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.src" }, "product_reference": "kernel-0:2.4.21-40.EL.src", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-BOOT-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-doc-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-source-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 3", "product_id": "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.src as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.src" }, "product_reference": "kernel-0:2.4.21-40.EL.src", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-BOOT-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-BOOT-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-BOOT-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-doc-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-doc-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-hugemem-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-smp-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.i386 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-40.EL.i386" }, "product_reference": "kernel-source-0:2.4.21-40.EL.i386", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-40.EL.ppc64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.ppc64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-source-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-source-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-source-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-source-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-source-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.athlon as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.athlon", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.i686 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.i686" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.i686", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia32e as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ia32e", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ia64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ia64", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.s390" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.s390", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.s390x as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.s390x", "relates_to_product_reference": "3WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-unsupported-0:2.4.21-40.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 3", "product_id": "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" }, "product_reference": "kernel-unsupported-0:2.4.21-40.EL.x86_64", "relates_to_product_reference": "3WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-2458", "discovery_date": "2005-08-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617720" } ], "notes": [ { "category": "description", "text": "inflate.c in the zlib routines in the Linux kernel before 2.6.12.5 allows remote attackers to cause a denial of service (kernel crash) via a compressed file with \"improper tables\".", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-40.EL.athlon", "3AS:kernel-0:2.4.21-40.EL.i686", "3AS:kernel-0:2.4.21-40.EL.ia32e", "3AS:kernel-0:2.4.21-40.EL.ia64", "3AS:kernel-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-0:2.4.21-40.EL.s390", "3AS:kernel-0:2.4.21-40.EL.s390x", "3AS:kernel-0:2.4.21-40.EL.src", "3AS:kernel-0:2.4.21-40.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3AS:kernel-doc-0:2.4.21-40.EL.i386", "3AS:kernel-doc-0:2.4.21-40.EL.ia64", "3AS:kernel-doc-0:2.4.21-40.EL.ppc64", "3AS:kernel-doc-0:2.4.21-40.EL.s390", "3AS:kernel-doc-0:2.4.21-40.EL.s390x", "3AS:kernel-doc-0:2.4.21-40.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-40.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3AS:kernel-source-0:2.4.21-40.EL.i386", "3AS:kernel-source-0:2.4.21-40.EL.ia64", "3AS:kernel-source-0:2.4.21-40.EL.ppc64", "3AS:kernel-source-0:2.4.21-40.EL.s390", "3AS:kernel-source-0:2.4.21-40.EL.s390x", "3AS:kernel-source-0:2.4.21-40.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-0:2.4.21-40.EL.athlon", "3Desktop:kernel-0:2.4.21-40.EL.i686", "3Desktop:kernel-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-0:2.4.21-40.EL.ia64", "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-40.EL.s390", "3Desktop:kernel-0:2.4.21-40.EL.s390x", "3Desktop:kernel-0:2.4.21-40.EL.src", "3Desktop:kernel-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-40.EL.i386", "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-40.EL.i386", "3Desktop:kernel-source-0:2.4.21-40.EL.ia64", "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-40.EL.s390", "3Desktop:kernel-source-0:2.4.21-40.EL.s390x", "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-0:2.4.21-40.EL.athlon", "3ES:kernel-0:2.4.21-40.EL.i686", "3ES:kernel-0:2.4.21-40.EL.ia32e", "3ES:kernel-0:2.4.21-40.EL.ia64", "3ES:kernel-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-0:2.4.21-40.EL.s390", "3ES:kernel-0:2.4.21-40.EL.s390x", "3ES:kernel-0:2.4.21-40.EL.src", "3ES:kernel-0:2.4.21-40.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3ES:kernel-doc-0:2.4.21-40.EL.i386", "3ES:kernel-doc-0:2.4.21-40.EL.ia64", "3ES:kernel-doc-0:2.4.21-40.EL.ppc64", "3ES:kernel-doc-0:2.4.21-40.EL.s390", "3ES:kernel-doc-0:2.4.21-40.EL.s390x", "3ES:kernel-doc-0:2.4.21-40.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-40.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-source-0:2.4.21-40.EL.i386", "3ES:kernel-source-0:2.4.21-40.EL.ia64", "3ES:kernel-source-0:2.4.21-40.EL.ppc64", "3ES:kernel-source-0:2.4.21-40.EL.s390", "3ES:kernel-source-0:2.4.21-40.EL.s390x", "3ES:kernel-source-0:2.4.21-40.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-0:2.4.21-40.EL.athlon", "3WS:kernel-0:2.4.21-40.EL.i686", "3WS:kernel-0:2.4.21-40.EL.ia32e", "3WS:kernel-0:2.4.21-40.EL.ia64", "3WS:kernel-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-0:2.4.21-40.EL.s390", "3WS:kernel-0:2.4.21-40.EL.s390x", "3WS:kernel-0:2.4.21-40.EL.src", "3WS:kernel-0:2.4.21-40.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3WS:kernel-doc-0:2.4.21-40.EL.i386", "3WS:kernel-doc-0:2.4.21-40.EL.ia64", "3WS:kernel-doc-0:2.4.21-40.EL.ppc64", "3WS:kernel-doc-0:2.4.21-40.EL.s390", "3WS:kernel-doc-0:2.4.21-40.EL.s390x", "3WS:kernel-doc-0:2.4.21-40.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-40.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-source-0:2.4.21-40.EL.i386", "3WS:kernel-source-0:2.4.21-40.EL.ia64", "3WS:kernel-source-0:2.4.21-40.EL.ppc64", "3WS:kernel-source-0:2.4.21-40.EL.s390", "3WS:kernel-source-0:2.4.21-40.EL.s390x", "3WS:kernel-source-0:2.4.21-40.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2458" }, { "category": "external", "summary": "RHBZ#1617720", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617720" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2458", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2458" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2458", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2458" } ], "release_date": "1999-06-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-03-15T14:05:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-40.EL.athlon", "3AS:kernel-0:2.4.21-40.EL.i686", "3AS:kernel-0:2.4.21-40.EL.ia32e", "3AS:kernel-0:2.4.21-40.EL.ia64", "3AS:kernel-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-0:2.4.21-40.EL.s390", "3AS:kernel-0:2.4.21-40.EL.s390x", "3AS:kernel-0:2.4.21-40.EL.src", "3AS:kernel-0:2.4.21-40.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3AS:kernel-doc-0:2.4.21-40.EL.i386", "3AS:kernel-doc-0:2.4.21-40.EL.ia64", "3AS:kernel-doc-0:2.4.21-40.EL.ppc64", "3AS:kernel-doc-0:2.4.21-40.EL.s390", "3AS:kernel-doc-0:2.4.21-40.EL.s390x", "3AS:kernel-doc-0:2.4.21-40.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-40.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3AS:kernel-source-0:2.4.21-40.EL.i386", "3AS:kernel-source-0:2.4.21-40.EL.ia64", "3AS:kernel-source-0:2.4.21-40.EL.ppc64", "3AS:kernel-source-0:2.4.21-40.EL.s390", "3AS:kernel-source-0:2.4.21-40.EL.s390x", "3AS:kernel-source-0:2.4.21-40.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-0:2.4.21-40.EL.athlon", "3Desktop:kernel-0:2.4.21-40.EL.i686", "3Desktop:kernel-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-0:2.4.21-40.EL.ia64", "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-40.EL.s390", "3Desktop:kernel-0:2.4.21-40.EL.s390x", "3Desktop:kernel-0:2.4.21-40.EL.src", "3Desktop:kernel-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-40.EL.i386", "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-40.EL.i386", "3Desktop:kernel-source-0:2.4.21-40.EL.ia64", "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-40.EL.s390", "3Desktop:kernel-source-0:2.4.21-40.EL.s390x", "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-0:2.4.21-40.EL.athlon", "3ES:kernel-0:2.4.21-40.EL.i686", "3ES:kernel-0:2.4.21-40.EL.ia32e", "3ES:kernel-0:2.4.21-40.EL.ia64", "3ES:kernel-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-0:2.4.21-40.EL.s390", "3ES:kernel-0:2.4.21-40.EL.s390x", "3ES:kernel-0:2.4.21-40.EL.src", "3ES:kernel-0:2.4.21-40.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3ES:kernel-doc-0:2.4.21-40.EL.i386", "3ES:kernel-doc-0:2.4.21-40.EL.ia64", "3ES:kernel-doc-0:2.4.21-40.EL.ppc64", "3ES:kernel-doc-0:2.4.21-40.EL.s390", "3ES:kernel-doc-0:2.4.21-40.EL.s390x", "3ES:kernel-doc-0:2.4.21-40.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-40.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-source-0:2.4.21-40.EL.i386", "3ES:kernel-source-0:2.4.21-40.EL.ia64", "3ES:kernel-source-0:2.4.21-40.EL.ppc64", "3ES:kernel-source-0:2.4.21-40.EL.s390", "3ES:kernel-source-0:2.4.21-40.EL.s390x", "3ES:kernel-source-0:2.4.21-40.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-0:2.4.21-40.EL.athlon", "3WS:kernel-0:2.4.21-40.EL.i686", "3WS:kernel-0:2.4.21-40.EL.ia32e", "3WS:kernel-0:2.4.21-40.EL.ia64", "3WS:kernel-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-0:2.4.21-40.EL.s390", "3WS:kernel-0:2.4.21-40.EL.s390x", "3WS:kernel-0:2.4.21-40.EL.src", "3WS:kernel-0:2.4.21-40.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3WS:kernel-doc-0:2.4.21-40.EL.i386", "3WS:kernel-doc-0:2.4.21-40.EL.ia64", "3WS:kernel-doc-0:2.4.21-40.EL.ppc64", "3WS:kernel-doc-0:2.4.21-40.EL.s390", "3WS:kernel-doc-0:2.4.21-40.EL.s390x", "3WS:kernel-doc-0:2.4.21-40.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-40.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-source-0:2.4.21-40.EL.i386", "3WS:kernel-source-0:2.4.21-40.EL.ia64", "3WS:kernel-source-0:2.4.21-40.EL.ppc64", "3WS:kernel-source-0:2.4.21-40.EL.s390", "3WS:kernel-source-0:2.4.21-40.EL.s390x", "3WS:kernel-source-0:2.4.21-40.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0144" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-2801", "discovery_date": "2005-02-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617759" } ], "notes": [ { "category": "description", "text": "xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6 does not properly compare the name_index fields when sharing xattr blocks, which could prevent default ACLs from being applied.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-40.EL.athlon", "3AS:kernel-0:2.4.21-40.EL.i686", "3AS:kernel-0:2.4.21-40.EL.ia32e", "3AS:kernel-0:2.4.21-40.EL.ia64", "3AS:kernel-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-0:2.4.21-40.EL.s390", "3AS:kernel-0:2.4.21-40.EL.s390x", "3AS:kernel-0:2.4.21-40.EL.src", "3AS:kernel-0:2.4.21-40.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3AS:kernel-doc-0:2.4.21-40.EL.i386", "3AS:kernel-doc-0:2.4.21-40.EL.ia64", "3AS:kernel-doc-0:2.4.21-40.EL.ppc64", "3AS:kernel-doc-0:2.4.21-40.EL.s390", "3AS:kernel-doc-0:2.4.21-40.EL.s390x", "3AS:kernel-doc-0:2.4.21-40.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-40.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3AS:kernel-source-0:2.4.21-40.EL.i386", "3AS:kernel-source-0:2.4.21-40.EL.ia64", "3AS:kernel-source-0:2.4.21-40.EL.ppc64", "3AS:kernel-source-0:2.4.21-40.EL.s390", "3AS:kernel-source-0:2.4.21-40.EL.s390x", "3AS:kernel-source-0:2.4.21-40.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-0:2.4.21-40.EL.athlon", "3Desktop:kernel-0:2.4.21-40.EL.i686", "3Desktop:kernel-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-0:2.4.21-40.EL.ia64", "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-40.EL.s390", "3Desktop:kernel-0:2.4.21-40.EL.s390x", "3Desktop:kernel-0:2.4.21-40.EL.src", "3Desktop:kernel-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-40.EL.i386", "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-40.EL.i386", "3Desktop:kernel-source-0:2.4.21-40.EL.ia64", "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-40.EL.s390", "3Desktop:kernel-source-0:2.4.21-40.EL.s390x", "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-0:2.4.21-40.EL.athlon", "3ES:kernel-0:2.4.21-40.EL.i686", "3ES:kernel-0:2.4.21-40.EL.ia32e", "3ES:kernel-0:2.4.21-40.EL.ia64", "3ES:kernel-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-0:2.4.21-40.EL.s390", "3ES:kernel-0:2.4.21-40.EL.s390x", "3ES:kernel-0:2.4.21-40.EL.src", "3ES:kernel-0:2.4.21-40.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3ES:kernel-doc-0:2.4.21-40.EL.i386", "3ES:kernel-doc-0:2.4.21-40.EL.ia64", "3ES:kernel-doc-0:2.4.21-40.EL.ppc64", "3ES:kernel-doc-0:2.4.21-40.EL.s390", "3ES:kernel-doc-0:2.4.21-40.EL.s390x", "3ES:kernel-doc-0:2.4.21-40.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-40.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-source-0:2.4.21-40.EL.i386", "3ES:kernel-source-0:2.4.21-40.EL.ia64", "3ES:kernel-source-0:2.4.21-40.EL.ppc64", "3ES:kernel-source-0:2.4.21-40.EL.s390", "3ES:kernel-source-0:2.4.21-40.EL.s390x", "3ES:kernel-source-0:2.4.21-40.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-0:2.4.21-40.EL.athlon", "3WS:kernel-0:2.4.21-40.EL.i686", "3WS:kernel-0:2.4.21-40.EL.ia32e", "3WS:kernel-0:2.4.21-40.EL.ia64", "3WS:kernel-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-0:2.4.21-40.EL.s390", "3WS:kernel-0:2.4.21-40.EL.s390x", "3WS:kernel-0:2.4.21-40.EL.src", "3WS:kernel-0:2.4.21-40.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3WS:kernel-doc-0:2.4.21-40.EL.i386", "3WS:kernel-doc-0:2.4.21-40.EL.ia64", "3WS:kernel-doc-0:2.4.21-40.EL.ppc64", "3WS:kernel-doc-0:2.4.21-40.EL.s390", "3WS:kernel-doc-0:2.4.21-40.EL.s390x", "3WS:kernel-doc-0:2.4.21-40.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-40.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-source-0:2.4.21-40.EL.i386", "3WS:kernel-source-0:2.4.21-40.EL.ia64", "3WS:kernel-source-0:2.4.21-40.EL.ppc64", "3WS:kernel-source-0:2.4.21-40.EL.s390", "3WS:kernel-source-0:2.4.21-40.EL.s390x", "3WS:kernel-source-0:2.4.21-40.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2801" }, { "category": "external", "summary": "RHBZ#1617759", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617759" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2801", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2801" } ], "release_date": "2005-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-03-15T14:05:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-40.EL.athlon", "3AS:kernel-0:2.4.21-40.EL.i686", "3AS:kernel-0:2.4.21-40.EL.ia32e", "3AS:kernel-0:2.4.21-40.EL.ia64", "3AS:kernel-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-0:2.4.21-40.EL.s390", "3AS:kernel-0:2.4.21-40.EL.s390x", "3AS:kernel-0:2.4.21-40.EL.src", "3AS:kernel-0:2.4.21-40.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3AS:kernel-doc-0:2.4.21-40.EL.i386", "3AS:kernel-doc-0:2.4.21-40.EL.ia64", "3AS:kernel-doc-0:2.4.21-40.EL.ppc64", "3AS:kernel-doc-0:2.4.21-40.EL.s390", "3AS:kernel-doc-0:2.4.21-40.EL.s390x", "3AS:kernel-doc-0:2.4.21-40.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-40.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3AS:kernel-source-0:2.4.21-40.EL.i386", "3AS:kernel-source-0:2.4.21-40.EL.ia64", "3AS:kernel-source-0:2.4.21-40.EL.ppc64", "3AS:kernel-source-0:2.4.21-40.EL.s390", "3AS:kernel-source-0:2.4.21-40.EL.s390x", "3AS:kernel-source-0:2.4.21-40.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-0:2.4.21-40.EL.athlon", "3Desktop:kernel-0:2.4.21-40.EL.i686", "3Desktop:kernel-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-0:2.4.21-40.EL.ia64", "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-40.EL.s390", "3Desktop:kernel-0:2.4.21-40.EL.s390x", "3Desktop:kernel-0:2.4.21-40.EL.src", "3Desktop:kernel-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-40.EL.i386", "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-40.EL.i386", "3Desktop:kernel-source-0:2.4.21-40.EL.ia64", "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-40.EL.s390", "3Desktop:kernel-source-0:2.4.21-40.EL.s390x", "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-0:2.4.21-40.EL.athlon", "3ES:kernel-0:2.4.21-40.EL.i686", "3ES:kernel-0:2.4.21-40.EL.ia32e", "3ES:kernel-0:2.4.21-40.EL.ia64", "3ES:kernel-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-0:2.4.21-40.EL.s390", "3ES:kernel-0:2.4.21-40.EL.s390x", "3ES:kernel-0:2.4.21-40.EL.src", "3ES:kernel-0:2.4.21-40.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3ES:kernel-doc-0:2.4.21-40.EL.i386", "3ES:kernel-doc-0:2.4.21-40.EL.ia64", "3ES:kernel-doc-0:2.4.21-40.EL.ppc64", "3ES:kernel-doc-0:2.4.21-40.EL.s390", "3ES:kernel-doc-0:2.4.21-40.EL.s390x", "3ES:kernel-doc-0:2.4.21-40.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-40.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-source-0:2.4.21-40.EL.i386", "3ES:kernel-source-0:2.4.21-40.EL.ia64", "3ES:kernel-source-0:2.4.21-40.EL.ppc64", "3ES:kernel-source-0:2.4.21-40.EL.s390", "3ES:kernel-source-0:2.4.21-40.EL.s390x", "3ES:kernel-source-0:2.4.21-40.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-0:2.4.21-40.EL.athlon", "3WS:kernel-0:2.4.21-40.EL.i686", "3WS:kernel-0:2.4.21-40.EL.ia32e", "3WS:kernel-0:2.4.21-40.EL.ia64", "3WS:kernel-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-0:2.4.21-40.EL.s390", "3WS:kernel-0:2.4.21-40.EL.s390x", "3WS:kernel-0:2.4.21-40.EL.src", "3WS:kernel-0:2.4.21-40.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3WS:kernel-doc-0:2.4.21-40.EL.i386", "3WS:kernel-doc-0:2.4.21-40.EL.ia64", "3WS:kernel-doc-0:2.4.21-40.EL.ppc64", "3WS:kernel-doc-0:2.4.21-40.EL.s390", "3WS:kernel-doc-0:2.4.21-40.EL.s390x", "3WS:kernel-doc-0:2.4.21-40.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-40.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-source-0:2.4.21-40.EL.i386", "3WS:kernel-source-0:2.4.21-40.EL.ia64", "3WS:kernel-source-0:2.4.21-40.EL.ppc64", "3WS:kernel-source-0:2.4.21-40.EL.s390", "3WS:kernel-source-0:2.4.21-40.EL.s390x", "3WS:kernel-source-0:2.4.21-40.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0144" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-3276", "discovery_date": "2005-07-27T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617813" } ], "notes": [ { "category": "description", "text": "The sys_get_thread_area function in process.c in Linux 2.6 before 2.6.12.4 and 2.6.13 does not clear a data structure before copying it to userspace, which might allow a user process to obtain sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-40.EL.athlon", "3AS:kernel-0:2.4.21-40.EL.i686", "3AS:kernel-0:2.4.21-40.EL.ia32e", "3AS:kernel-0:2.4.21-40.EL.ia64", "3AS:kernel-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-0:2.4.21-40.EL.s390", "3AS:kernel-0:2.4.21-40.EL.s390x", "3AS:kernel-0:2.4.21-40.EL.src", "3AS:kernel-0:2.4.21-40.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3AS:kernel-doc-0:2.4.21-40.EL.i386", "3AS:kernel-doc-0:2.4.21-40.EL.ia64", "3AS:kernel-doc-0:2.4.21-40.EL.ppc64", "3AS:kernel-doc-0:2.4.21-40.EL.s390", "3AS:kernel-doc-0:2.4.21-40.EL.s390x", "3AS:kernel-doc-0:2.4.21-40.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-40.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3AS:kernel-source-0:2.4.21-40.EL.i386", "3AS:kernel-source-0:2.4.21-40.EL.ia64", "3AS:kernel-source-0:2.4.21-40.EL.ppc64", "3AS:kernel-source-0:2.4.21-40.EL.s390", "3AS:kernel-source-0:2.4.21-40.EL.s390x", "3AS:kernel-source-0:2.4.21-40.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-0:2.4.21-40.EL.athlon", "3Desktop:kernel-0:2.4.21-40.EL.i686", "3Desktop:kernel-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-0:2.4.21-40.EL.ia64", "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-40.EL.s390", "3Desktop:kernel-0:2.4.21-40.EL.s390x", "3Desktop:kernel-0:2.4.21-40.EL.src", "3Desktop:kernel-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-40.EL.i386", "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-40.EL.i386", "3Desktop:kernel-source-0:2.4.21-40.EL.ia64", "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-40.EL.s390", "3Desktop:kernel-source-0:2.4.21-40.EL.s390x", "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-0:2.4.21-40.EL.athlon", "3ES:kernel-0:2.4.21-40.EL.i686", "3ES:kernel-0:2.4.21-40.EL.ia32e", "3ES:kernel-0:2.4.21-40.EL.ia64", "3ES:kernel-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-0:2.4.21-40.EL.s390", "3ES:kernel-0:2.4.21-40.EL.s390x", "3ES:kernel-0:2.4.21-40.EL.src", "3ES:kernel-0:2.4.21-40.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3ES:kernel-doc-0:2.4.21-40.EL.i386", "3ES:kernel-doc-0:2.4.21-40.EL.ia64", "3ES:kernel-doc-0:2.4.21-40.EL.ppc64", "3ES:kernel-doc-0:2.4.21-40.EL.s390", "3ES:kernel-doc-0:2.4.21-40.EL.s390x", "3ES:kernel-doc-0:2.4.21-40.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-40.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-source-0:2.4.21-40.EL.i386", "3ES:kernel-source-0:2.4.21-40.EL.ia64", "3ES:kernel-source-0:2.4.21-40.EL.ppc64", "3ES:kernel-source-0:2.4.21-40.EL.s390", "3ES:kernel-source-0:2.4.21-40.EL.s390x", "3ES:kernel-source-0:2.4.21-40.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-0:2.4.21-40.EL.athlon", "3WS:kernel-0:2.4.21-40.EL.i686", "3WS:kernel-0:2.4.21-40.EL.ia32e", "3WS:kernel-0:2.4.21-40.EL.ia64", "3WS:kernel-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-0:2.4.21-40.EL.s390", "3WS:kernel-0:2.4.21-40.EL.s390x", "3WS:kernel-0:2.4.21-40.EL.src", "3WS:kernel-0:2.4.21-40.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3WS:kernel-doc-0:2.4.21-40.EL.i386", "3WS:kernel-doc-0:2.4.21-40.EL.ia64", "3WS:kernel-doc-0:2.4.21-40.EL.ppc64", "3WS:kernel-doc-0:2.4.21-40.EL.s390", "3WS:kernel-doc-0:2.4.21-40.EL.s390x", "3WS:kernel-doc-0:2.4.21-40.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-40.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-source-0:2.4.21-40.EL.i386", "3WS:kernel-source-0:2.4.21-40.EL.ia64", "3WS:kernel-source-0:2.4.21-40.EL.ppc64", "3WS:kernel-source-0:2.4.21-40.EL.s390", "3WS:kernel-source-0:2.4.21-40.EL.s390x", "3WS:kernel-source-0:2.4.21-40.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3276" }, { "category": "external", "summary": "RHBZ#1617813", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617813" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3276", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3276" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3276", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3276" } ], "release_date": "2005-07-27T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-03-15T14:05:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-40.EL.athlon", "3AS:kernel-0:2.4.21-40.EL.i686", "3AS:kernel-0:2.4.21-40.EL.ia32e", "3AS:kernel-0:2.4.21-40.EL.ia64", "3AS:kernel-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-0:2.4.21-40.EL.s390", "3AS:kernel-0:2.4.21-40.EL.s390x", "3AS:kernel-0:2.4.21-40.EL.src", "3AS:kernel-0:2.4.21-40.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3AS:kernel-doc-0:2.4.21-40.EL.i386", "3AS:kernel-doc-0:2.4.21-40.EL.ia64", "3AS:kernel-doc-0:2.4.21-40.EL.ppc64", "3AS:kernel-doc-0:2.4.21-40.EL.s390", "3AS:kernel-doc-0:2.4.21-40.EL.s390x", "3AS:kernel-doc-0:2.4.21-40.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-40.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3AS:kernel-source-0:2.4.21-40.EL.i386", "3AS:kernel-source-0:2.4.21-40.EL.ia64", "3AS:kernel-source-0:2.4.21-40.EL.ppc64", "3AS:kernel-source-0:2.4.21-40.EL.s390", "3AS:kernel-source-0:2.4.21-40.EL.s390x", "3AS:kernel-source-0:2.4.21-40.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-0:2.4.21-40.EL.athlon", "3Desktop:kernel-0:2.4.21-40.EL.i686", "3Desktop:kernel-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-0:2.4.21-40.EL.ia64", "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-40.EL.s390", "3Desktop:kernel-0:2.4.21-40.EL.s390x", "3Desktop:kernel-0:2.4.21-40.EL.src", "3Desktop:kernel-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-40.EL.i386", "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-40.EL.i386", "3Desktop:kernel-source-0:2.4.21-40.EL.ia64", "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-40.EL.s390", "3Desktop:kernel-source-0:2.4.21-40.EL.s390x", "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-0:2.4.21-40.EL.athlon", "3ES:kernel-0:2.4.21-40.EL.i686", "3ES:kernel-0:2.4.21-40.EL.ia32e", "3ES:kernel-0:2.4.21-40.EL.ia64", "3ES:kernel-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-0:2.4.21-40.EL.s390", "3ES:kernel-0:2.4.21-40.EL.s390x", "3ES:kernel-0:2.4.21-40.EL.src", "3ES:kernel-0:2.4.21-40.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3ES:kernel-doc-0:2.4.21-40.EL.i386", "3ES:kernel-doc-0:2.4.21-40.EL.ia64", "3ES:kernel-doc-0:2.4.21-40.EL.ppc64", "3ES:kernel-doc-0:2.4.21-40.EL.s390", "3ES:kernel-doc-0:2.4.21-40.EL.s390x", "3ES:kernel-doc-0:2.4.21-40.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-40.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-source-0:2.4.21-40.EL.i386", "3ES:kernel-source-0:2.4.21-40.EL.ia64", "3ES:kernel-source-0:2.4.21-40.EL.ppc64", "3ES:kernel-source-0:2.4.21-40.EL.s390", "3ES:kernel-source-0:2.4.21-40.EL.s390x", "3ES:kernel-source-0:2.4.21-40.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-0:2.4.21-40.EL.athlon", "3WS:kernel-0:2.4.21-40.EL.i686", "3WS:kernel-0:2.4.21-40.EL.ia32e", "3WS:kernel-0:2.4.21-40.EL.ia64", "3WS:kernel-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-0:2.4.21-40.EL.s390", "3WS:kernel-0:2.4.21-40.EL.s390x", "3WS:kernel-0:2.4.21-40.EL.src", "3WS:kernel-0:2.4.21-40.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3WS:kernel-doc-0:2.4.21-40.EL.i386", "3WS:kernel-doc-0:2.4.21-40.EL.ia64", "3WS:kernel-doc-0:2.4.21-40.EL.ppc64", "3WS:kernel-doc-0:2.4.21-40.EL.s390", "3WS:kernel-doc-0:2.4.21-40.EL.s390x", "3WS:kernel-doc-0:2.4.21-40.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-40.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-source-0:2.4.21-40.EL.i386", "3WS:kernel-source-0:2.4.21-40.EL.ia64", "3WS:kernel-source-0:2.4.21-40.EL.ppc64", "3WS:kernel-source-0:2.4.21-40.EL.s390", "3WS:kernel-source-0:2.4.21-40.EL.s390x", "3WS:kernel-source-0:2.4.21-40.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0144" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" }, { "cve": "CVE-2005-4798", "discovery_date": "2005-09-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617863" } ], "notes": [ { "category": "description", "text": "Buffer overflow in NFS readlink handling in the Linux Kernel 2.4 up to 2.4.31 allows remote NFS servers to cause a denial of service (crash) via a long symlink, which is not properly handled in (1) nfs2xdr.c or (2) nfs3xdr.c and causes a crash in the NFS client.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "3AS:kernel-0:2.4.21-40.EL.athlon", "3AS:kernel-0:2.4.21-40.EL.i686", "3AS:kernel-0:2.4.21-40.EL.ia32e", "3AS:kernel-0:2.4.21-40.EL.ia64", "3AS:kernel-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-0:2.4.21-40.EL.s390", "3AS:kernel-0:2.4.21-40.EL.s390x", "3AS:kernel-0:2.4.21-40.EL.src", "3AS:kernel-0:2.4.21-40.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3AS:kernel-doc-0:2.4.21-40.EL.i386", "3AS:kernel-doc-0:2.4.21-40.EL.ia64", "3AS:kernel-doc-0:2.4.21-40.EL.ppc64", "3AS:kernel-doc-0:2.4.21-40.EL.s390", "3AS:kernel-doc-0:2.4.21-40.EL.s390x", "3AS:kernel-doc-0:2.4.21-40.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-40.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3AS:kernel-source-0:2.4.21-40.EL.i386", "3AS:kernel-source-0:2.4.21-40.EL.ia64", "3AS:kernel-source-0:2.4.21-40.EL.ppc64", "3AS:kernel-source-0:2.4.21-40.EL.s390", "3AS:kernel-source-0:2.4.21-40.EL.s390x", "3AS:kernel-source-0:2.4.21-40.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-0:2.4.21-40.EL.athlon", "3Desktop:kernel-0:2.4.21-40.EL.i686", "3Desktop:kernel-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-0:2.4.21-40.EL.ia64", "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-40.EL.s390", "3Desktop:kernel-0:2.4.21-40.EL.s390x", "3Desktop:kernel-0:2.4.21-40.EL.src", "3Desktop:kernel-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-40.EL.i386", "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-40.EL.i386", "3Desktop:kernel-source-0:2.4.21-40.EL.ia64", "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-40.EL.s390", "3Desktop:kernel-source-0:2.4.21-40.EL.s390x", "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-0:2.4.21-40.EL.athlon", "3ES:kernel-0:2.4.21-40.EL.i686", "3ES:kernel-0:2.4.21-40.EL.ia32e", "3ES:kernel-0:2.4.21-40.EL.ia64", "3ES:kernel-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-0:2.4.21-40.EL.s390", "3ES:kernel-0:2.4.21-40.EL.s390x", "3ES:kernel-0:2.4.21-40.EL.src", "3ES:kernel-0:2.4.21-40.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3ES:kernel-doc-0:2.4.21-40.EL.i386", "3ES:kernel-doc-0:2.4.21-40.EL.ia64", "3ES:kernel-doc-0:2.4.21-40.EL.ppc64", "3ES:kernel-doc-0:2.4.21-40.EL.s390", "3ES:kernel-doc-0:2.4.21-40.EL.s390x", "3ES:kernel-doc-0:2.4.21-40.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-40.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-source-0:2.4.21-40.EL.i386", "3ES:kernel-source-0:2.4.21-40.EL.ia64", "3ES:kernel-source-0:2.4.21-40.EL.ppc64", "3ES:kernel-source-0:2.4.21-40.EL.s390", "3ES:kernel-source-0:2.4.21-40.EL.s390x", "3ES:kernel-source-0:2.4.21-40.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-0:2.4.21-40.EL.athlon", "3WS:kernel-0:2.4.21-40.EL.i686", "3WS:kernel-0:2.4.21-40.EL.ia32e", "3WS:kernel-0:2.4.21-40.EL.ia64", "3WS:kernel-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-0:2.4.21-40.EL.s390", "3WS:kernel-0:2.4.21-40.EL.s390x", "3WS:kernel-0:2.4.21-40.EL.src", "3WS:kernel-0:2.4.21-40.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3WS:kernel-doc-0:2.4.21-40.EL.i386", "3WS:kernel-doc-0:2.4.21-40.EL.ia64", "3WS:kernel-doc-0:2.4.21-40.EL.ppc64", "3WS:kernel-doc-0:2.4.21-40.EL.s390", "3WS:kernel-doc-0:2.4.21-40.EL.s390x", "3WS:kernel-doc-0:2.4.21-40.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-40.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-source-0:2.4.21-40.EL.i386", "3WS:kernel-source-0:2.4.21-40.EL.ia64", "3WS:kernel-source-0:2.4.21-40.EL.ppc64", "3WS:kernel-source-0:2.4.21-40.EL.s390", "3WS:kernel-source-0:2.4.21-40.EL.s390x", "3WS:kernel-source-0:2.4.21-40.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-4798" }, { "category": "external", "summary": "RHBZ#1617863", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617863" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-4798", "url": "https://www.cve.org/CVERecord?id=CVE-2005-4798" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-4798", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4798" } ], "release_date": "2005-09-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2006-03-15T14:05:00+00:00", "details": "Before applying this update, make sure that all previously released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "3AS:kernel-0:2.4.21-40.EL.athlon", "3AS:kernel-0:2.4.21-40.EL.i686", "3AS:kernel-0:2.4.21-40.EL.ia32e", "3AS:kernel-0:2.4.21-40.EL.ia64", "3AS:kernel-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-0:2.4.21-40.EL.s390", "3AS:kernel-0:2.4.21-40.EL.s390x", "3AS:kernel-0:2.4.21-40.EL.src", "3AS:kernel-0:2.4.21-40.EL.x86_64", "3AS:kernel-BOOT-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3AS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3AS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3AS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3AS:kernel-doc-0:2.4.21-40.EL.i386", "3AS:kernel-doc-0:2.4.21-40.EL.ia64", "3AS:kernel-doc-0:2.4.21-40.EL.ppc64", "3AS:kernel-doc-0:2.4.21-40.EL.s390", "3AS:kernel-doc-0:2.4.21-40.EL.s390x", "3AS:kernel-doc-0:2.4.21-40.EL.x86_64", "3AS:kernel-hugemem-0:2.4.21-40.EL.i686", "3AS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-0:2.4.21-40.EL.i686", "3AS:kernel-smp-0:2.4.21-40.EL.x86_64", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3AS:kernel-source-0:2.4.21-40.EL.i386", "3AS:kernel-source-0:2.4.21-40.EL.ia64", "3AS:kernel-source-0:2.4.21-40.EL.ppc64", "3AS:kernel-source-0:2.4.21-40.EL.s390", "3AS:kernel-source-0:2.4.21-40.EL.s390x", "3AS:kernel-source-0:2.4.21-40.EL.x86_64", "3AS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3AS:kernel-unsupported-0:2.4.21-40.EL.i686", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3AS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390", "3AS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3AS:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-0:2.4.21-40.EL.athlon", "3Desktop:kernel-0:2.4.21-40.EL.i686", "3Desktop:kernel-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-0:2.4.21-40.EL.ia64", "3Desktop:kernel-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-0:2.4.21-40.EL.s390", "3Desktop:kernel-0:2.4.21-40.EL.s390x", "3Desktop:kernel-0:2.4.21-40.EL.src", "3Desktop:kernel-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-BOOT-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i386", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.i686", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3Desktop:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-doc-0:2.4.21-40.EL.i386", "3Desktop:kernel-doc-0:2.4.21-40.EL.ia64", "3Desktop:kernel-doc-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390", "3Desktop:kernel-doc-0:2.4.21-40.EL.s390x", "3Desktop:kernel-doc-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-hugemem-0:2.4.21-40.EL.i686", "3Desktop:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-source-0:2.4.21-40.EL.i386", "3Desktop:kernel-source-0:2.4.21-40.EL.ia64", "3Desktop:kernel-source-0:2.4.21-40.EL.ppc64", "3Desktop:kernel-source-0:2.4.21-40.EL.s390", "3Desktop:kernel-source-0:2.4.21-40.EL.s390x", "3Desktop:kernel-source-0:2.4.21-40.EL.x86_64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.athlon", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.i686", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ia64", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.s390x", "3Desktop:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-0:2.4.21-40.EL.athlon", "3ES:kernel-0:2.4.21-40.EL.i686", "3ES:kernel-0:2.4.21-40.EL.ia32e", "3ES:kernel-0:2.4.21-40.EL.ia64", "3ES:kernel-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-0:2.4.21-40.EL.s390", "3ES:kernel-0:2.4.21-40.EL.s390x", "3ES:kernel-0:2.4.21-40.EL.src", "3ES:kernel-0:2.4.21-40.EL.x86_64", "3ES:kernel-BOOT-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i386", "3ES:kernel-debuginfo-0:2.4.21-40.EL.i686", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390", "3ES:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3ES:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3ES:kernel-doc-0:2.4.21-40.EL.i386", "3ES:kernel-doc-0:2.4.21-40.EL.ia64", "3ES:kernel-doc-0:2.4.21-40.EL.ppc64", "3ES:kernel-doc-0:2.4.21-40.EL.s390", "3ES:kernel-doc-0:2.4.21-40.EL.s390x", "3ES:kernel-doc-0:2.4.21-40.EL.x86_64", "3ES:kernel-hugemem-0:2.4.21-40.EL.i686", "3ES:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-0:2.4.21-40.EL.i686", "3ES:kernel-smp-0:2.4.21-40.EL.x86_64", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3ES:kernel-source-0:2.4.21-40.EL.i386", "3ES:kernel-source-0:2.4.21-40.EL.ia64", "3ES:kernel-source-0:2.4.21-40.EL.ppc64", "3ES:kernel-source-0:2.4.21-40.EL.s390", "3ES:kernel-source-0:2.4.21-40.EL.s390x", "3ES:kernel-source-0:2.4.21-40.EL.x86_64", "3ES:kernel-unsupported-0:2.4.21-40.EL.athlon", "3ES:kernel-unsupported-0:2.4.21-40.EL.i686", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3ES:kernel-unsupported-0:2.4.21-40.EL.ia64", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390", "3ES:kernel-unsupported-0:2.4.21-40.EL.s390x", "3ES:kernel-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-0:2.4.21-40.EL.athlon", "3WS:kernel-0:2.4.21-40.EL.i686", "3WS:kernel-0:2.4.21-40.EL.ia32e", "3WS:kernel-0:2.4.21-40.EL.ia64", "3WS:kernel-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-0:2.4.21-40.EL.s390", "3WS:kernel-0:2.4.21-40.EL.s390x", "3WS:kernel-0:2.4.21-40.EL.src", "3WS:kernel-0:2.4.21-40.EL.x86_64", "3WS:kernel-BOOT-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.athlon", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i386", "3WS:kernel-debuginfo-0:2.4.21-40.EL.i686", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia32e", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ia64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390", "3WS:kernel-debuginfo-0:2.4.21-40.EL.s390x", "3WS:kernel-debuginfo-0:2.4.21-40.EL.x86_64", "3WS:kernel-doc-0:2.4.21-40.EL.i386", "3WS:kernel-doc-0:2.4.21-40.EL.ia64", "3WS:kernel-doc-0:2.4.21-40.EL.ppc64", "3WS:kernel-doc-0:2.4.21-40.EL.s390", "3WS:kernel-doc-0:2.4.21-40.EL.s390x", "3WS:kernel-doc-0:2.4.21-40.EL.x86_64", "3WS:kernel-hugemem-0:2.4.21-40.EL.i686", "3WS:kernel-hugemem-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-0:2.4.21-40.EL.i686", "3WS:kernel-smp-0:2.4.21-40.EL.x86_64", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-smp-unsupported-0:2.4.21-40.EL.x86_64", "3WS:kernel-source-0:2.4.21-40.EL.i386", "3WS:kernel-source-0:2.4.21-40.EL.ia64", "3WS:kernel-source-0:2.4.21-40.EL.ppc64", "3WS:kernel-source-0:2.4.21-40.EL.s390", "3WS:kernel-source-0:2.4.21-40.EL.s390x", "3WS:kernel-source-0:2.4.21-40.EL.x86_64", "3WS:kernel-unsupported-0:2.4.21-40.EL.athlon", "3WS:kernel-unsupported-0:2.4.21-40.EL.i686", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia32e", "3WS:kernel-unsupported-0:2.4.21-40.EL.ia64", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64iseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.ppc64pseries", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390", "3WS:kernel-unsupported-0:2.4.21-40.EL.s390x", "3WS:kernel-unsupported-0:2.4.21-40.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2006:0144" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" } ] }
rhsa-2005_514
Vulnerability from csaf_redhat
Published
2005-10-05 12:02
Modified
2024-11-22 00:09
Summary
Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 4 Update 2
Notes
Topic
Updated kernel packages are now available as part of ongoing support
and maintenance of Red Hat Enterprise Linux version 4. This is the
second regular update.
This update has been rated as having important security impact by the
Red Hat Security Response Team.
Details
The Linux kernel handles the basic functions of the operating system.
This is the second regular kernel update to Red Hat Enterprise Linux 4.
New features introduced in this update include:
- Audit support
- systemtap - kprobes, relayfs
- Keyring support
- iSCSI Initiator - iscsi_sfnet 4:0.1.11-1
- Device mapper multipath support
- Intel dual core support
- esb2 chipset support
- Increased exec-shield coverage
- Dirty page tracking for HA systems
- Diskdump -- allow partial diskdumps and directing to swap
There were several bug fixes in various parts of the kernel. The ongoing
effort to resolve these problems has resulted in a marked improvement
in the reliability and scalability of Red Hat Enterprise Linux 4.
The following security bugs were fixed in this update, detailed below with
corresponding CAN names available from the Common Vulnerabilities and
Exposures project (cve.mitre.org):
- flaws in ptrace() syscall handling on 64-bit systems that allowed a local
user to cause a denial of service (crash) (CAN-2005-0756, CAN-2005-1761,
CAN-2005-1762, CAN-2005-1763)
- flaws in IPSEC network handling that allowed a local user to cause a
denial of service or potentially gain privileges (CAN-2005-2456, CAN-2005-2555)
- a flaw in sendmsg() syscall handling on 64-bit systems that allowed a
local user to cause a denial of service or potentially gain privileges
(CAN-2005-2490)
- a flaw in sendmsg() syscall handling that allowed a local user to cause a
denial of service by altering hardware state (CAN-2005-2492)
- a flaw that prevented the topdown allocator from allocating mmap areas
all the way down to address zero (CAN-2005-1265)
- flaws dealing with keyrings that could cause a local denial of service
(CAN-2005-2098, CAN-2005-2099)
- a flaw in the 4GB split patch that could allow a local denial of service
(CAN-2005-2100)
- a xattr sharing bug in the ext2 and ext3 file systems that could cause
default ACLs to disappear (CAN-2005-2801)
- a flaw in the ipt_recent module on 64-bit architectures which could allow
a remote denial of service (CAN-2005-2872)
The following device drivers have been upgraded to new versions:
qla2100 --------- 8.00.00b21-k to 8.01.00b5-rh2
qla2200 --------- 8.00.00b21-k to 8.01.00b5-rh2
qla2300 --------- 8.00.00b21-k to 8.01.00b5-rh2
qla2322 --------- 8.00.00b21-k to 8.01.00b5-rh2
qla2xxx --------- 8.00.00b21-k to 8.01.00b5-rh2
qla6312 --------- 8.00.00b21-k to 8.01.00b5-rh2
megaraid_mbox --- 2.20.4.5 to 2.20.4.6
megaraid_mm ----- 2.20.2.5 to 2.20.2.6
lpfc ------------ 0:8.0.16.6_x2 to 0:8.0.16.17
cciss ----------- 2.6.4 to 2.6.6
ipw2100 --------- 1.0.3 to 1.1.0
tg3 ------------- 3.22-rh to 3.27-rh
e100 ------------ 3.3.6-k2-NAPI to 3.4.8-k2-NAPI
e1000 ----------- 5.6.10.1-k2-NAPI to 6.0.54-k2-NAPI
3c59x ----------- LK1.1.19
mptbase --------- 3.01.16 to 3.02.18
ixgb ------------ 1.0.66 to 1.0.95-k2-NAPI
libata ---------- 1.10 to 1.11
sata_via -------- 1.0 to 1.1
sata_ahci ------- 1.00 to 1.01
sata_qstor ------ 0.04
sata_sil -------- 0.8 to 0.9
sata_svw -------- 1.05 to 1.06
s390: crypto ---- 1.31 to 1.57
s390: zfcp ------
s390: CTC-MPC ---
s390: dasd -------
s390: cio -------
s390: qeth ------
All Red Hat Enterprise Linux 4 users are advised to upgrade their
kernels to the packages associated with their machine architectures
and configurations as listed in this erratum.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Important" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated kernel packages are now available as part of ongoing support\nand maintenance of Red Hat Enterprise Linux version 4. This is the\nsecond regular update.\n\nThis update has been rated as having important security impact by the\nRed Hat Security Response Team.", "title": "Topic" }, { "category": "general", "text": "The Linux kernel handles the basic functions of the operating system.\n\nThis is the second regular kernel update to Red Hat Enterprise Linux 4.\n\nNew features introduced in this update include:\n- Audit support\n- systemtap - kprobes, relayfs\n- Keyring support\n- iSCSI Initiator - iscsi_sfnet 4:0.1.11-1\n- Device mapper multipath support\n- Intel dual core support\n- esb2 chipset support\n- Increased exec-shield coverage\n- Dirty page tracking for HA systems\n- Diskdump -- allow partial diskdumps and directing to swap\n\nThere were several bug fixes in various parts of the kernel. The ongoing\neffort to resolve these problems has resulted in a marked improvement\nin the reliability and scalability of Red Hat Enterprise Linux 4. \n\nThe following security bugs were fixed in this update, detailed below with\ncorresponding CAN names available from the Common Vulnerabilities and\nExposures project (cve.mitre.org):\n\n- flaws in ptrace() syscall handling on 64-bit systems that allowed a local\nuser to cause a denial of service (crash) (CAN-2005-0756, CAN-2005-1761,\nCAN-2005-1762, CAN-2005-1763)\n\n- flaws in IPSEC network handling that allowed a local user to cause a\ndenial of service or potentially gain privileges (CAN-2005-2456, CAN-2005-2555)\n\n- a flaw in sendmsg() syscall handling on 64-bit systems that allowed a\nlocal user to cause a denial of service or potentially gain privileges\n(CAN-2005-2490)\n\n- a flaw in sendmsg() syscall handling that allowed a local user to cause a\ndenial of service by altering hardware state (CAN-2005-2492)\n\n- a flaw that prevented the topdown allocator from allocating mmap areas\nall the way down to address zero (CAN-2005-1265)\n\n- flaws dealing with keyrings that could cause a local denial of service\n(CAN-2005-2098, CAN-2005-2099)\n\n- a flaw in the 4GB split patch that could allow a local denial of service\n(CAN-2005-2100)\n\n- a xattr sharing bug in the ext2 and ext3 file systems that could cause\ndefault ACLs to disappear (CAN-2005-2801)\n\n- a flaw in the ipt_recent module on 64-bit architectures which could allow\na remote denial of service (CAN-2005-2872)\n\nThe following device drivers have been upgraded to new versions:\n\nqla2100 --------- 8.00.00b21-k to 8.01.00b5-rh2\nqla2200 --------- 8.00.00b21-k to 8.01.00b5-rh2\nqla2300 --------- 8.00.00b21-k to 8.01.00b5-rh2\nqla2322 --------- 8.00.00b21-k to 8.01.00b5-rh2\nqla2xxx --------- 8.00.00b21-k to 8.01.00b5-rh2\nqla6312 --------- 8.00.00b21-k to 8.01.00b5-rh2\nmegaraid_mbox --- 2.20.4.5 to 2.20.4.6\nmegaraid_mm ----- 2.20.2.5 to 2.20.2.6 \nlpfc ------------ 0:8.0.16.6_x2 to 0:8.0.16.17\ncciss ----------- 2.6.4 to 2.6.6\nipw2100 --------- 1.0.3 to 1.1.0\ntg3 ------------- 3.22-rh to 3.27-rh\ne100 ------------ 3.3.6-k2-NAPI to 3.4.8-k2-NAPI\ne1000 ----------- 5.6.10.1-k2-NAPI to 6.0.54-k2-NAPI\n3c59x ----------- LK1.1.19\nmptbase --------- 3.01.16 to 3.02.18\nixgb ------------ 1.0.66 to 1.0.95-k2-NAPI\nlibata ---------- 1.10 to 1.11\nsata_via -------- 1.0 to 1.1\nsata_ahci ------- 1.00 to 1.01\nsata_qstor ------ 0.04\nsata_sil -------- 0.8 to 0.9\nsata_svw -------- 1.05 to 1.06\ns390: crypto ---- 1.31 to 1.57\ns390: zfcp ------ \ns390: CTC-MPC ---\ns390: dasd -------\ns390: cio -------\ns390: qeth ------\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their\nkernels to the packages associated with their machine architectures\nand configurations as listed in this erratum.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2005:514", "url": "https://access.redhat.com/errata/RHSA-2005:514" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#important", "url": "https://access.redhat.com/security/updates/classification/#important" }, { "category": "external", "summary": "114578", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=114578" }, { "category": "external", "summary": "130914", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=130914" }, { "category": "external", "summary": "134790", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=134790" }, { "category": "external", "summary": "135669", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=135669" }, { "category": "external", "summary": "137343", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=137343" }, { "category": "external", "summary": "140002", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=140002" }, { "category": "external", "summary": "141783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=141783" }, { "category": "external", "summary": "142989", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=142989" }, { "category": "external", "summary": "144668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=144668" }, { "category": "external", "summary": "145575", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=145575" }, { "category": "external", "summary": "145648", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=145648" }, { "category": "external", "summary": "145659", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=145659" }, { "category": "external", "summary": "145976", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=145976" }, { "category": "external", "summary": "146187", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=146187" }, { "category": "external", "summary": "147233", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=147233" }, { "category": "external", "summary": "147496", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=147496" }, { "category": "external", "summary": "149478", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=149478" }, { "category": "external", "summary": "149919", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=149919" }, { "category": "external", "summary": "149979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=149979" }, { "category": "external", "summary": "150152", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=150152" }, { "category": "external", "summary": "151222", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=151222" }, { "category": "external", "summary": "151315", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=151315" }, { "category": "external", "summary": "151323", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=151323" }, { "category": "external", "summary": "151429", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=151429" }, { "category": "external", "summary": "152162", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152162" }, { "category": "external", "summary": "152440", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152440" }, { "category": "external", "summary": "152619", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152619" }, { "category": "external", "summary": "152982", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=152982" }, { "category": "external", "summary": "154055", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=154055" }, { "category": "external", "summary": "154100", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=154100" }, { "category": "external", "summary": "154347", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=154347" }, { "category": "external", "summary": "154435", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=154435" }, { "category": "external", "summary": "154442", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=154442" }, { "category": "external", "summary": "154451", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=154451" }, { "category": "external", "summary": "154733", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=154733" }, { "category": "external", "summary": "155278", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=155278" }, { "category": "external", "summary": "155344", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=155344" }, { "category": "external", "summary": "155354", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=155354" }, { "category": "external", "summary": "155706", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=155706" }, { "category": "external", "summary": "155932", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=155932" }, { "category": "external", "summary": "156010", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156010" }, { "category": "external", "summary": "156705", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=156705" }, { "category": "external", "summary": "157239", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=157239" }, { "category": "external", "summary": "157725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=157725" }, { "category": "external", "summary": "157900", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=157900" }, { "category": "external", "summary": "158107", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158107" }, { "category": "external", "summary": "158293", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158293" }, { "category": "external", "summary": "158878", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158878" }, { "category": "external", "summary": "158883", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158883" }, { "category": "external", "summary": "158930", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158930" }, { "category": "external", "summary": "158974", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=158974" }, { "category": "external", "summary": "159640", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159640" }, { "category": "external", "summary": "159671", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159671" }, { "category": "external", "summary": "159739", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159739" }, { "category": "external", "summary": "159765", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159765" }, { "category": "external", "summary": "159918", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159918" }, { "category": "external", "summary": "159921", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=159921" }, { "category": "external", "summary": "160028", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160028" }, { "category": "external", "summary": "160117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160117" }, { "category": "external", "summary": "160518", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160518" }, { "category": "external", "summary": "160522", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160522" }, { "category": "external", "summary": "160524", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160524" }, { "category": "external", "summary": "160526", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160526" }, { "category": "external", "summary": "160528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160528" }, { "category": "external", "summary": "160547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160547" }, { "category": "external", "summary": "160548", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160548" }, { "category": "external", "summary": "160654", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160654" }, { "category": "external", "summary": "160663", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160663" }, { "category": "external", "summary": "160812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160812" }, { "category": "external", "summary": "160882", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160882" }, { "category": "external", "summary": "161143", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161143" }, { "category": "external", "summary": "161156", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161156" }, { "category": "external", "summary": "161314", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161314" }, { "category": "external", "summary": "161789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161789" }, { "category": "external", "summary": "161995", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=161995" }, { "category": "external", "summary": "162108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162108" }, { "category": "external", "summary": "162257", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162257" }, { "category": "external", "summary": "162548", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162548" }, { "category": "external", "summary": "162728", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=162728" }, { "category": "external", "summary": "163528", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=163528" }, { "category": "external", "summary": "164094", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164094" }, { "category": "external", "summary": "164228", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164228" }, { "category": "external", "summary": "164338", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164338" }, { "category": "external", "summary": "164449", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164449" }, { "category": "external", "summary": "164450", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164450" }, { "category": "external", "summary": "164628", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164628" }, { "category": "external", "summary": "164630", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164630" }, { "category": "external", "summary": "164979", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164979" }, { "category": "external", "summary": "164991", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=164991" }, { "category": "external", "summary": "165127", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165127" }, { "category": "external", "summary": "165163", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165163" }, { "category": "external", "summary": "165242", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165242" }, { "category": "external", "summary": "165384", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165384" }, { "category": "external", "summary": "165547", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165547" }, { "category": "external", "summary": "165560", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165560" }, { "category": "external", "summary": "165717", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=165717" }, { "category": "external", "summary": "166131", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166131" }, { "category": "external", "summary": "166248", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166248" }, { "category": "external", "summary": "166830", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=166830" }, { "category": "external", "summary": "167126", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167126" }, { "category": "external", "summary": "167412", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167412" }, { "category": "external", "summary": "167668", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167668" }, { "category": "external", "summary": "167703", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167703" }, { "category": "external", "summary": "167711", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=167711" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2005/rhsa-2005_514.json" } ], "title": "Red Hat Security Advisory: Updated kernel packages available for Red Hat Enterprise Linux 4 Update 2", "tracking": { "current_release_date": "2024-11-22T00:09:16+00:00", "generator": { "date": "2024-11-22T00:09:16+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2005:514", "initial_release_date": "2005-10-05T12:02:00+00:00", "revision_history": [ { "date": "2005-10-05T12:02:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2005-10-05T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T00:09:16+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS version 4", "product": { "name": "Red Hat Enterprise Linux AS version 4", "product_id": "4AS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::as" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop version 4", "product": { "name": "Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::desktop" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 4", "product": { "name": "Red Hat Enterprise Linux ES version 4", "product_id": "4ES", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 4", "product": { "name": "Red Hat Enterprise Linux WS version 4", "product_id": "4WS", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:4::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-22.EL.i686", "product": { "name": "kernel-devel-0:2.6.9-22.EL.i686", "product_id": "kernel-devel-0:2.6.9-22.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-22.EL.i686", "product": { "name": "kernel-smp-0:2.6.9-22.EL.i686", "product_id": "kernel-smp-0:2.6.9-22.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-22.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-22.EL.i686", "product": { "name": "kernel-debuginfo-0:2.6.9-22.EL.i686", "product_id": "kernel-debuginfo-0:2.6.9-22.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-22.EL.i686", "product": { "name": "kernel-0:2.6.9-22.EL.i686", "product_id": "kernel-0:2.6.9-22.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-22.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-0:2.6.9-22.EL.i686", "product": { "name": "kernel-hugemem-0:2.6.9-22.EL.i686", "product_id": "kernel-hugemem-0:2.6.9-22.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-22.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-hugemem-devel-0:2.6.9-22.EL.i686", "product": { "name": "kernel-hugemem-devel-0:2.6.9-22.EL.i686", "product_id": "kernel-hugemem-devel-0:2.6.9-22.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-22.EL?arch=i686" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-22.EL.i686", "product": { "name": "kernel-smp-devel-0:2.6.9-22.EL.i686", "product_id": "kernel-smp-devel-0:2.6.9-22.EL.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-22.EL?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-22.EL.ia64", "product": { "name": "kernel-devel-0:2.6.9-22.EL.ia64", "product_id": "kernel-devel-0:2.6.9-22.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-22.EL.ia64", "product": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ia64", "product_id": "kernel-debuginfo-0:2.6.9-22.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.EL?arch=ia64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-22.EL.ia64", "product": { "name": "kernel-0:2.6.9-22.EL.ia64", "product_id": "kernel-0:2.6.9-22.EL.ia64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-22.EL?arch=ia64" } } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-22.EL.x86_64", "product": { "name": "kernel-devel-0:2.6.9-22.EL.x86_64", "product_id": "kernel-devel-0:2.6.9-22.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-0:2.6.9-22.EL.x86_64", "product": { "name": "kernel-smp-0:2.6.9-22.EL.x86_64", "product_id": "kernel-smp-0:2.6.9-22.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp@2.6.9-22.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-22.EL.x86_64", "product": { "name": "kernel-debuginfo-0:2.6.9-22.EL.x86_64", "product_id": "kernel-debuginfo-0:2.6.9-22.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-22.EL.x86_64", "product": { "name": "kernel-0:2.6.9-22.EL.x86_64", "product_id": "kernel-0:2.6.9-22.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-22.EL?arch=x86_64" } } }, { "category": "product_version", "name": "kernel-smp-devel-0:2.6.9-22.EL.x86_64", "product": { "name": "kernel-smp-devel-0:2.6.9-22.EL.x86_64", "product_id": "kernel-smp-devel-0:2.6.9-22.EL.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-22.EL?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "kernel-0:2.6.9-22.EL.src", "product": { "name": "kernel-0:2.6.9-22.EL.src", "product_id": "kernel-0:2.6.9-22.EL.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-22.EL?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "kernel-doc-0:2.6.9-22.EL.noarch", "product": { "name": "kernel-doc-0:2.6.9-22.EL.noarch", "product_id": "kernel-doc-0:2.6.9-22.EL.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-doc@2.6.9-22.EL?arch=noarch" } } } ], "category": "architecture", "name": "noarch" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-22.EL.ppc64", "product": { "name": "kernel-devel-0:2.6.9-22.EL.ppc64", "product_id": "kernel-devel-0:2.6.9-22.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-22.EL.ppc64", "product": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ppc64", "product_id": "kernel-debuginfo-0:2.6.9-22.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.EL?arch=ppc64" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-22.EL.ppc64", "product": { "name": "kernel-0:2.6.9-22.EL.ppc64", "product_id": "kernel-0:2.6.9-22.EL.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-22.EL?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-22.EL.ppc64iseries", "product": { "name": "kernel-devel-0:2.6.9-22.EL.ppc64iseries", "product_id": "kernel-devel-0:2.6.9-22.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "product": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "product_id": "kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.EL?arch=ppc64iseries" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-22.EL.ppc64iseries", "product": { "name": "kernel-0:2.6.9-22.EL.ppc64iseries", "product_id": "kernel-0:2.6.9-22.EL.ppc64iseries", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-22.EL?arch=ppc64iseries" } } } ], "category": "architecture", "name": "ppc64iseries" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-22.EL.s390x", "product": { "name": "kernel-devel-0:2.6.9-22.EL.s390x", "product_id": "kernel-devel-0:2.6.9-22.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-22.EL.s390x", "product": { "name": "kernel-debuginfo-0:2.6.9-22.EL.s390x", "product_id": "kernel-debuginfo-0:2.6.9-22.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.EL?arch=s390x" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-22.EL.s390x", "product": { "name": "kernel-0:2.6.9-22.EL.s390x", "product_id": "kernel-0:2.6.9-22.EL.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-22.EL?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "kernel-devel-0:2.6.9-22.EL.s390", "product": { "name": "kernel-devel-0:2.6.9-22.EL.s390", "product_id": "kernel-devel-0:2.6.9-22.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-devel@2.6.9-22.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-debuginfo-0:2.6.9-22.EL.s390", "product": { "name": "kernel-debuginfo-0:2.6.9-22.EL.s390", "product_id": "kernel-debuginfo-0:2.6.9-22.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-22.EL?arch=s390" } } }, { "category": "product_version", "name": "kernel-0:2.6.9-22.EL.s390", "product": { "name": "kernel-0:2.6.9-22.EL.s390", "product_id": "kernel-0:2.6.9-22.EL.s390", "product_identification_helper": { "purl": "pkg:rpm/redhat/kernel@2.6.9-22.EL?arch=s390" } } } ], "category": "architecture", "name": "s390" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-22.EL.ia64" }, "product_reference": "kernel-0:2.6.9-22.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-22.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-22.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-22.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-22.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-22.EL.s390" }, "product_reference": "kernel-0:2.6.9-22.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-22.EL.s390x" }, "product_reference": "kernel-0:2.6.9-22.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.src as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-22.EL.src" }, "product_reference": "kernel-0:2.6.9-22.EL.src", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-22.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.ia64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-22.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.ppc64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.ppc64iseries", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.s390 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-22.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.s390", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.s390x as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-22.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.s390x", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-devel-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-22.EL.noarch as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-doc-0:2.6.9-22.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-22.EL.noarch", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4", "product_id": "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4AS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-22.EL.ia64" }, "product_reference": "kernel-0:2.6.9-22.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-22.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-22.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-22.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-22.EL.s390" }, "product_reference": "kernel-0:2.6.9-22.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-22.EL.s390x" }, "product_reference": "kernel-0:2.6.9-22.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.src as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-22.EL.src" }, "product_reference": "kernel-0:2.6.9-22.EL.src", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.ia64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.ppc64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.ppc64iseries", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-22.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.s390", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.s390x", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-22.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-22.EL.noarch", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4", "product_id": "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4Desktop" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-22.EL.ia64" }, "product_reference": "kernel-0:2.6.9-22.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-22.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-22.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-22.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-22.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-22.EL.s390" }, "product_reference": "kernel-0:2.6.9-22.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-22.EL.s390x" }, "product_reference": "kernel-0:2.6.9-22.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.src as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-22.EL.src" }, "product_reference": "kernel-0:2.6.9-22.EL.src", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-22.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.ia64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-22.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.ppc64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.ppc64iseries", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.s390 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-22.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.s390", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.s390x as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-22.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.s390x", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-devel-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-22.EL.noarch as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-doc-0:2.6.9-22.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-22.EL.noarch", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4", "product_id": "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4ES" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-22.EL.ia64" }, "product_reference": "kernel-0:2.6.9-22.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-22.EL.ppc64" }, "product_reference": "kernel-0:2.6.9-22.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-22.EL.ppc64iseries" }, "product_reference": "kernel-0:2.6.9-22.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-22.EL.s390" }, "product_reference": "kernel-0:2.6.9-22.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-22.EL.s390x" }, "product_reference": "kernel-0:2.6.9-22.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.src as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-22.EL.src" }, "product_reference": "kernel-0:2.6.9-22.EL.src", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-debuginfo-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-debuginfo-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-22.EL.ia64" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.ia64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-22.EL.ppc64" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.ppc64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.ppc64iseries", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.s390 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-22.EL.s390" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.s390", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.s390x as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-22.EL.s390x" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.s390x", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-devel-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-devel-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-devel-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-doc-0:2.6.9-22.EL.noarch as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-doc-0:2.6.9-22.EL.noarch" }, "product_reference": "kernel-doc-0:2.6.9-22.EL.noarch", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-hugemem-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-hugemem-devel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-hugemem-devel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-smp-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-smp-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-22.EL.i686 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686" }, "product_reference": "kernel-smp-devel-0:2.6.9-22.EL.i686", "relates_to_product_reference": "4WS" }, { "category": "default_component_of", "full_product_name": { "name": "kernel-smp-devel-0:2.6.9-22.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4", "product_id": "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" }, "product_reference": "kernel-smp-devel-0:2.6.9-22.EL.x86_64", "relates_to_product_reference": "4WS" } ] }, "vulnerabilities": [ { "cve": "CVE-2005-0756", "discovery_date": "2005-05-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617571" } ], "notes": [ { "category": "description", "text": "ptrace in Linux kernel 2.6.8.1 does not properly verify addresses on the amd64 platform, which allows local users to cause a denial of service (kernel crash).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-0756" }, { "category": "external", "summary": "RHBZ#1617571", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617571" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-0756", "url": "https://www.cve.org/CVERecord?id=CVE-2005-0756" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-0756", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-0756" } ], "release_date": "2005-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-1265", "discovery_date": "2005-05-19T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617622" } ], "notes": [ { "category": "description", "text": "The mmap function in the Linux Kernel 2.6.10 can be used to create memory maps with a start address beyond the end address, which allows local users to cause a denial of service (kernel crash).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1265" }, { "category": "external", "summary": "RHBZ#1617622", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617622" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1265", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1265" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1265", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1265" } ], "release_date": "2005-05-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-1761", "discovery_date": "2005-06-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617665" } ], "notes": [ { "category": "description", "text": "Linux kernel 2.6 and 2.4 on the IA64 architecture allows local users to cause a denial of service (kernel crash) via ptrace and the restore_sigcontext function.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1761" }, { "category": "external", "summary": "RHBZ#1617665", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617665" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1761", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1761" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1761", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1761" } ], "release_date": "2005-06-21T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-1762", "discovery_date": "2005-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617666" } ], "notes": [ { "category": "description", "text": "The ptrace call in the Linux kernel 2.6.8.1 and 2.6.10 for the AMD64 platform allows local users to cause a denial of service (kernel crash) via a \"non-canonical\" address.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1762" }, { "category": "external", "summary": "RHBZ#1617666", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617666" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1762", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1762" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1762", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1762" } ], "release_date": "2005-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-1763", "discovery_date": "2005-06-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617667" } ], "notes": [ { "category": "description", "text": "Buffer overflow in ptrace in the Linux Kernel for 64-bit architectures allows local users to write bytes into kernel memory.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-1763" }, { "category": "external", "summary": "RHBZ#1617667", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617667" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-1763", "url": "https://www.cve.org/CVERecord?id=CVE-2005-1763" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-1763", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-1763" } ], "release_date": "2005-05-20T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-2098", "discovery_date": "2005-08-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617685" } ], "notes": [ { "category": "description", "text": "The KEYCTL_JOIN_SESSION_KEYRING operation in the Linux kernel before 2.6.12.5 contains an error path that does not properly release the session management semaphore, which allows local users or remote attackers to cause a denial of service (semaphore hang) via a new session keyring (1) with an empty name string, (2) with a long name string, (3) with the key quota reached, or (4) ENOMEM.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2098" }, { "category": "external", "summary": "RHBZ#1617685", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617685" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2098", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2098" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2098", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2098" } ], "release_date": "2005-08-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-2099", "discovery_date": "2005-08-03T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617686" } ], "notes": [ { "category": "description", "text": "The Linux kernel before 2.6.12.5 does not properly destroy a keyring that is not instantiated properly, which allows local users or remote attackers to cause a denial of service (kernel oops) via a keyring with a payload that is not empty, which causes the creation to fail, leading to a null dereference in the keyring destructor.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2099" }, { "category": "external", "summary": "RHBZ#1617686", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617686" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2099", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2099" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2099", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2099" } ], "release_date": "2005-08-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-2100", "discovery_date": "2004-12-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617687" } ], "notes": [ { "category": "description", "text": "The rw_vm function in usercopy.c in the 4GB split patch for the Linux kernel in Red Hat Enterprise Linux 4 does not perform proper bounds checking, which allows local users to cause a denial of service (crash).", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2100" }, { "category": "external", "summary": "RHBZ#1617687", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617687" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2100", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2100" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2100", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2100" } ], "release_date": "2005-10-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-2456", "discovery_date": "2005-07-25T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617719" } ], "notes": [ { "category": "description", "text": "Array index overflow in the xfrm_sk_policy_insert function in xfrm_user.c in Linux kernel 2.6 allows local users to cause a denial of service (oops or deadlock) and possibly execute arbitrary code via a p-\u003edir value that is larger than XFRM_POLICY_OUT, which is used as an index in the sock-\u003esk_policy array.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2456" }, { "category": "external", "summary": "RHBZ#1617719", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617719" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2456", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2456" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2456", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2456" } ], "release_date": "2005-07-25T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-2490", "discovery_date": "2005-08-17T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617724" } ], "notes": [ { "category": "description", "text": "Stack-based buffer overflow in the sendmsg function call in the Linux kernel 2.6 before 2.6.13.1 allows local users to execute arbitrary code by calling sendmsg and modifying the message contents in another thread.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2490" }, { "category": "external", "summary": "RHBZ#1617724", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617724" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2490", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2490" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2490", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2490" } ], "release_date": "2005-09-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-2492", "discovery_date": "2005-08-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617725" } ], "notes": [ { "category": "description", "text": "The raw_sendmsg function in the Linux kernel 2.6 before 2.6.13.1 allows local users to cause a denial of service (change hardware state) or read from arbitrary memory via crafted input.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2492" }, { "category": "external", "summary": "RHBZ#1617725", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617725" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2492", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2492" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2492", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2492" } ], "release_date": "2005-09-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-2555", "discovery_date": "2005-08-16T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617734" } ], "notes": [ { "category": "description", "text": "Linux kernel 2.6.x does not properly restrict socket policy access to users with the CAP_NET_ADMIN capability, which could allow local users to conduct unauthorized activities via (1) ipv4/ip_sockglue.c and (2) ipv6/ipv6_sockglue.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2555" }, { "category": "external", "summary": "RHBZ#1617734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617734" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2555", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2555" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2555", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2555" } ], "release_date": "2005-08-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-2801", "discovery_date": "2005-02-05T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617759" } ], "notes": [ { "category": "description", "text": "xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6 does not properly compare the name_index fields when sharing xattr blocks, which could prevent default ACLs from being applied.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2801" }, { "category": "external", "summary": "RHBZ#1617759", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617759" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2801", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2801" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2801", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2801" } ], "release_date": "2005-02-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "security flaw" }, { "cve": "CVE-2005-2872", "discovery_date": "2005-09-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617761" } ], "notes": [ { "category": "description", "text": "The ipt_recent kernel module (ipt_recent.c) in Linux kernel before 2.6.12, when running on 64-bit processors such as AMD64, allows remote attackers to cause a denial of service (kernel panic) via certain attacks such as SSH brute force, which leads to memset calls using a length based on the u_int32_t type, acting on an array of unsigned long elements, a different vulnerability than CVE-2005-2873.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-2872" }, { "category": "external", "summary": "RHBZ#1617761", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617761" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-2872", "url": "https://www.cve.org/CVERecord?id=CVE-2005-2872" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-2872", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2872" } ], "release_date": "2005-05-09T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-3105", "discovery_date": "2005-03-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617781" } ], "notes": [ { "category": "description", "text": "The mprotect code (mprotect.c) in Linux 2.6 on Itanium IA64 Montecito processors does not properly maintain cache coherency as required by the architecture, which allows local users to cause a denial of service and possibly corrupt data by modifying PTE protections.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3105" }, { "category": "external", "summary": "RHBZ#1617781", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617781" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3105", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3105" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3105", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3105" } ], "release_date": "2005-03-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-3274", "discovery_date": "2005-06-28T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617811" } ], "notes": [ { "category": "description", "text": "Race condition in ip_vs_conn_flush in Linux 2.6 before 2.6.13 and 2.4 before 2.4.32-pre2, when running on SMP systems, allows local users to cause a denial of service (null dereference) by causing a connection timer to expire while the connection table is being flushed before the appropriate lock is acquired.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3274" }, { "category": "external", "summary": "RHBZ#1617811", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617811" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3274", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3274" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3274", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3274" } ], "release_date": "2005-06-28T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-3275", "discovery_date": "2005-07-22T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1617812" } ], "notes": [ { "category": "description", "text": "The NAT code (1) ip_nat_proto_tcp.c and (2) ip_nat_proto_udp.c in Linux kernel 2.6 before 2.6.13 and 2.4 before 2.4.32-rc1 incorrectly declares a variable to be static, which allows remote attackers to cause a denial of service (memory corruption) by causing two packets for the same protocol to be NATed at the same time, which leads to memory corruption.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-3275" }, { "category": "external", "summary": "RHBZ#1617812", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1617812" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-3275", "url": "https://www.cve.org/CVERecord?id=CVE-2005-3275" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-3275", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-3275" } ], "release_date": "2005-07-22T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "security flaw" }, { "cve": "CVE-2005-4886", "discovery_date": "2005-04-24T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "160117" } ], "notes": [ { "category": "description", "text": "The selinux_parse_skb_ipv6 function in security/selinux/hooks.c in the Linux kernel before 2.6.12-rc4 allows remote attackers to cause a denial of service (OOPS) via vectors associated with an incorrect call to the ipv6_skip_exthdr function.", "title": "Vulnerability description" }, { "category": "summary", "text": "Fix ipv6 exthdr bug causing Oops", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2005-4886" }, { "category": "external", "summary": "RHBZ#160117", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=160117" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2005-4886", "url": "https://www.cve.org/CVERecord?id=CVE-2005-4886" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2005-4886", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-4886" } ], "release_date": "2005-04-24T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "products": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Important" } ], "title": "Fix ipv6 exthdr bug causing Oops" }, { "cve": "CVE-2006-5871", "discovery_date": "2006-12-01T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1618230" } ], "notes": [ { "category": "description", "text": "smbfs in Linux kernel 2.6.8 and other versions, and 2.4.x before 2.4.34, when UNIX extensions are enabled, ignores certain mount options, which could cause clients to use server-specified uid, gid and mode settings.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2006-5871" }, { "category": "external", "summary": "RHBZ#1618230", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1618230" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2006-5871", "url": "https://www.cve.org/CVERecord?id=CVE-2006-5871" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5871", "url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5871" } ], "release_date": "2004-10-19T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2005-10-05T12:02:00+00:00", "details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. Use Red Hat\nNetwork to download and update your packages. To launch the Red Hat\nUpdate Agent, use the following command:\n\n up2date\n\nFor information on how to install packages manually, refer to the\nfollowing Web page for the System Administration or Customization\nguide specific to your system:\n\n http://www.redhat.com/docs/manuals/enterprise/", "product_ids": [ "4AS:kernel-0:2.6.9-22.EL.i686", "4AS:kernel-0:2.6.9-22.EL.ia64", "4AS:kernel-0:2.6.9-22.EL.ppc64", "4AS:kernel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-0:2.6.9-22.EL.s390", "4AS:kernel-0:2.6.9-22.EL.s390x", "4AS:kernel-0:2.6.9-22.EL.src", "4AS:kernel-0:2.6.9-22.EL.x86_64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4AS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4AS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4AS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4AS:kernel-devel-0:2.6.9-22.EL.i686", "4AS:kernel-devel-0:2.6.9-22.EL.ia64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64", "4AS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4AS:kernel-devel-0:2.6.9-22.EL.s390", "4AS:kernel-devel-0:2.6.9-22.EL.s390x", "4AS:kernel-devel-0:2.6.9-22.EL.x86_64", "4AS:kernel-doc-0:2.6.9-22.EL.noarch", "4AS:kernel-hugemem-0:2.6.9-22.EL.i686", "4AS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.i686", "4AS:kernel-smp-0:2.6.9-22.EL.x86_64", "4AS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4AS:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-0:2.6.9-22.EL.i686", "4Desktop:kernel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-0:2.6.9-22.EL.s390", "4Desktop:kernel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-0:2.6.9-22.EL.src", "4Desktop:kernel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.i686", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4Desktop:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-devel-0:2.6.9-22.EL.ia64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64", "4Desktop:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390", "4Desktop:kernel-devel-0:2.6.9-22.EL.s390x", "4Desktop:kernel-devel-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-doc-0:2.6.9-22.EL.noarch", "4Desktop:kernel-hugemem-0:2.6.9-22.EL.i686", "4Desktop:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-0:2.6.9-22.EL.x86_64", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.i686", "4Desktop:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-0:2.6.9-22.EL.i686", "4ES:kernel-0:2.6.9-22.EL.ia64", "4ES:kernel-0:2.6.9-22.EL.ppc64", "4ES:kernel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-0:2.6.9-22.EL.s390", "4ES:kernel-0:2.6.9-22.EL.s390x", "4ES:kernel-0:2.6.9-22.EL.src", "4ES:kernel-0:2.6.9-22.EL.x86_64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.i686", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4ES:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390", "4ES:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4ES:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4ES:kernel-devel-0:2.6.9-22.EL.i686", "4ES:kernel-devel-0:2.6.9-22.EL.ia64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64", "4ES:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4ES:kernel-devel-0:2.6.9-22.EL.s390", "4ES:kernel-devel-0:2.6.9-22.EL.s390x", "4ES:kernel-devel-0:2.6.9-22.EL.x86_64", "4ES:kernel-doc-0:2.6.9-22.EL.noarch", "4ES:kernel-hugemem-0:2.6.9-22.EL.i686", "4ES:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.i686", "4ES:kernel-smp-0:2.6.9-22.EL.x86_64", "4ES:kernel-smp-devel-0:2.6.9-22.EL.i686", "4ES:kernel-smp-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-0:2.6.9-22.EL.i686", "4WS:kernel-0:2.6.9-22.EL.ia64", "4WS:kernel-0:2.6.9-22.EL.ppc64", "4WS:kernel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-0:2.6.9-22.EL.s390", "4WS:kernel-0:2.6.9-22.EL.s390x", "4WS:kernel-0:2.6.9-22.EL.src", "4WS:kernel-0:2.6.9-22.EL.x86_64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.i686", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ia64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64", "4WS:kernel-debuginfo-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390", "4WS:kernel-debuginfo-0:2.6.9-22.EL.s390x", "4WS:kernel-debuginfo-0:2.6.9-22.EL.x86_64", "4WS:kernel-devel-0:2.6.9-22.EL.i686", "4WS:kernel-devel-0:2.6.9-22.EL.ia64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64", "4WS:kernel-devel-0:2.6.9-22.EL.ppc64iseries", "4WS:kernel-devel-0:2.6.9-22.EL.s390", "4WS:kernel-devel-0:2.6.9-22.EL.s390x", "4WS:kernel-devel-0:2.6.9-22.EL.x86_64", "4WS:kernel-doc-0:2.6.9-22.EL.noarch", "4WS:kernel-hugemem-0:2.6.9-22.EL.i686", "4WS:kernel-hugemem-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.i686", "4WS:kernel-smp-0:2.6.9-22.EL.x86_64", "4WS:kernel-smp-devel-0:2.6.9-22.EL.i686", "4WS:kernel-smp-devel-0:2.6.9-22.EL.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2005:514" } ], "threats": [ { "category": "impact", "details": "Low" } ], "title": "security flaw" } ] }
gsd-2005-2801
Vulnerability from gsd
Modified
2023-12-13 01:20
Details
xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6 does not properly compare the name_index fields when sharing xattr blocks, which could prevent default ACLs from being applied.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2005-2801", "description": "xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6 does not properly compare the name_index fields when sharing xattr blocks, which could prevent default ACLs from being applied.", "id": "GSD-2005-2801", "references": [ "https://www.suse.com/security/cve/CVE-2005-2801.html", "https://www.debian.org/security/2005/dsa-922", "https://www.debian.org/security/2005/dsa-921", "https://access.redhat.com/errata/RHSA-2006:0144", "https://access.redhat.com/errata/RHSA-2005:514" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2005-2801" ], "details": "xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6 does not properly compare the name_index fields when sharing xattr blocks, which could prevent default ACLs from being applied.", "id": "GSD-2005-2801", "modified": "2023-12-13T01:20:10.110035Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2801", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6 does not properly compare the name_index fields when sharing xattr blocks, which could prevent default ACLs from being applied." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "18056", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18056" }, { "name": "17073", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17073" }, { "name": "RHSA-2006:0144", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2006-0144.html" }, { "name": "SUSE-SA:2005:018", "refsource": "SUSE", "url": "http://www.novell.com/linux/security/advisories/2005_18_kernel.html" }, { "name": "oval:org.mitre.oval:def:10495", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10495" }, { "name": "18059", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/18059" }, { "name": "[Acl-Devel] 20050205 [FIX] Long-standing xattr sharing bug", "refsource": "MLIST", "url": "http://acl.bestbits.at/pipermail/acl-devel/2005-February/001848.html" }, { "name": "[debian-kernel] 20050809 Re: ACL patches in Debian 2.4 series kernel.", "refsource": "MLIST", "url": "http://lists.debian.org/debian-kernel/2005/08/msg00238.html" }, { "name": "DSA-922", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-922" }, { "name": "DSA-921", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2005/dsa-921" }, { "name": "RHSA-2005:514", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2005-514.html" }, { "name": "17826", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/17826" }, { "name": "FLSA:157459-3", "refsource": "FEDORA", "url": "http://www.securityfocus.com/archive/1/427980/100/0/threaded" }, { "name": "MDKSA-2005:219", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219" }, { "name": "14793", "refsource": "BID", "url": "http://www.securityfocus.com/bid/14793" }, { "name": "19252", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/19252" } ] } }, "nvd.nist.gov": { "cve": { "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "142BCD48-8387-4D0C-A052-44DD4144CBFF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "descriptions": [ { "lang": "en", "value": "xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6 does not properly compare the name_index fields when sharing xattr blocks, which could prevent default ACLs from being applied." } ], "id": "CVE-2005-2801", "lastModified": "2024-02-16T16:53:52.023", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2005-09-06T17:03:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Broken Link", "Exploit" ], "url": "http://acl.bestbits.at/pipermail/acl-devel/2005-February/001848.html" }, { "source": "cve@mitre.org", "tags": [ "Mailing List", "Patch" ], "url": "http://lists.debian.org/debian-kernel/2005/08/msg00238.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/17073" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/17826" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/18056" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/18059" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://secunia.com/advisories/19252" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2005/dsa-921" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2005/dsa-922" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Patch", "Vendor Advisory" ], "url": "http://www.novell.com/linux/security/advisories/2005_18_kernel.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2005-514.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "http://www.redhat.com/support/errata/RHSA-2006-0144.html" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/archive/1/427980/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/14793" }, { "source": "cve@mitre.org", "tags": [ "Broken Link" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10495" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-697" } ], "source": "nvd@nist.gov", "type": "Primary" } ] } } } }
ghsa-wq7h-x8rp-qhq7
Vulnerability from github
Published
2022-05-01 02:11
Modified
2024-02-16 18:31
Severity ?
Details
xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6 does not properly compare the name_index fields when sharing xattr blocks, which could prevent default ACLs from being applied.
{ "affected": [], "aliases": [ "CVE-2005-2801" ], "database_specific": { "cwe_ids": [ "CWE-697" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2005-09-06T17:03:00Z", "severity": "MODERATE" }, "details": "xattr.c in the ext2 and ext3 file system code for Linux kernel 2.6 does not properly compare the name_index fields when sharing xattr blocks, which could prevent default ACLs from being applied.", "id": "GHSA-wq7h-x8rp-qhq7", "modified": "2024-02-16T18:31:01Z", "published": "2022-05-01T02:11:42Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2005-2801" }, { "type": "WEB", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10495" }, { "type": "WEB", "url": "http://acl.bestbits.at/pipermail/acl-devel/2005-February/001848.html" }, { "type": "WEB", "url": "http://lists.debian.org/debian-kernel/2005/08/msg00238.html" }, { "type": "WEB", "url": "http://secunia.com/advisories/17073" }, { "type": "WEB", "url": "http://secunia.com/advisories/17826" }, { "type": "WEB", "url": "http://secunia.com/advisories/18056" }, { "type": "WEB", "url": "http://secunia.com/advisories/18059" }, { "type": "WEB", "url": "http://secunia.com/advisories/19252" }, { "type": "WEB", "url": "http://www.debian.org/security/2005/dsa-921" }, { "type": "WEB", "url": "http://www.debian.org/security/2005/dsa-922" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2005:219" }, { "type": "WEB", "url": "http://www.novell.com/linux/security/advisories/2005_18_kernel.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2005-514.html" }, { "type": "WEB", "url": "http://www.redhat.com/support/errata/RHSA-2006-0144.html" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/427980/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/14793" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N", "type": "CVSS_V3" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.