Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2007-2876 (GCVE-0-2007-2876)
Vulnerability from cvelistv5 – Published: 2007-06-11 23:00 – Updated: 2024-08-07 13:57- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T13:57:54.199Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "24376",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/24376"
},
{
"name": "27227",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/27227"
},
{
"name": "26664",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26664"
},
{
"name": "SUSE-SA:2007:051",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://www.novell.com/linux/security/advisories/2007_51_kernel.html"
},
{
"name": "ADV-2007-2105",
"tags": [
"vdb-entry",
"x_refsource_VUPEN",
"x_transferred"
],
"url": "http://www.vupen.com/english/advisories/2007/2105"
},
{
"name": "SUSE-SA:2007:053",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://www.novell.com/linux/security/advisories/2007_53_kernel.html"
},
{
"name": "SUSE-SA:2007:043",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://www.novell.com/linux/security/advisories/2007_43_kernel.html"
},
{
"name": "26289",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26289"
},
{
"name": "25838",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/25838"
},
{
"name": "MDKSA-2007:171",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:171"
},
{
"name": "USN-510-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-510-1"
},
{
"name": "DSA-1356",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2007/dsa-1356"
},
{
"name": "26760",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26760"
},
{
"name": "RHSA-2007:0705",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0705.html"
},
{
"name": "26620",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26620"
},
{
"name": "USN-489-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-489-1"
},
{
"name": "MDKSA-2007:196",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:196"
},
{
"name": "kernel-sctpnew-dos(34777)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34777"
},
{
"name": "[linux-kernel] 20070608 Linux 2.6.21.4",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=118128622431272\u0026w=2"
},
{
"name": "25961",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/25961"
},
{
"name": "oval:org.mitre.oval:def:10116",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10116"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm"
},
{
"name": "USN-486-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-486-1"
},
{
"name": "26450",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26450"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4"
},
{
"name": "37112",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://osvdb.org/37112"
},
{
"name": "[linux-kernel] 20070608 Linux 2.6.20.13",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=118128610219959\u0026w=2"
},
{
"name": "26139",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26139"
},
{
"name": "RHSA-2007:0488",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "http://rhn.redhat.com/errata/RHSA-2007-0488.html"
},
{
"name": "26133",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/26133"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2007-06-08T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by causing certain invalid states that trigger a NULL pointer dereference."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-10T00:57:01.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "24376",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/24376"
},
{
"name": "27227",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/27227"
},
{
"name": "26664",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26664"
},
{
"name": "SUSE-SA:2007:051",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://www.novell.com/linux/security/advisories/2007_51_kernel.html"
},
{
"name": "ADV-2007-2105",
"tags": [
"vdb-entry",
"x_refsource_VUPEN"
],
"url": "http://www.vupen.com/english/advisories/2007/2105"
},
{
"name": "SUSE-SA:2007:053",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://www.novell.com/linux/security/advisories/2007_53_kernel.html"
},
{
"name": "SUSE-SA:2007:043",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://www.novell.com/linux/security/advisories/2007_43_kernel.html"
},
{
"name": "26289",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26289"
},
{
"name": "25838",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/25838"
},
{
"name": "MDKSA-2007:171",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:171"
},
{
"name": "USN-510-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-510-1"
},
{
"name": "DSA-1356",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2007/dsa-1356"
},
{
"name": "26760",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26760"
},
{
"name": "RHSA-2007:0705",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0705.html"
},
{
"name": "26620",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26620"
},
{
"name": "USN-489-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-489-1"
},
{
"name": "MDKSA-2007:196",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:196"
},
{
"name": "kernel-sctpnew-dos(34777)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34777"
},
{
"name": "[linux-kernel] 20070608 Linux 2.6.21.4",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=118128622431272\u0026w=2"
},
{
"name": "25961",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/25961"
},
{
"name": "oval:org.mitre.oval:def:10116",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10116"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm"
},
{
"name": "USN-486-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-486-1"
},
{
"name": "26450",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26450"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4"
},
{
"name": "37112",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://osvdb.org/37112"
},
{
"name": "[linux-kernel] 20070608 Linux 2.6.20.13",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=linux-kernel\u0026m=118128610219959\u0026w=2"
},
{
"name": "26139",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26139"
},
{
"name": "RHSA-2007:0488",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "http://rhn.redhat.com/errata/RHSA-2007-0488.html"
},
{
"name": "26133",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/26133"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-2876",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by causing certain invalid states that trigger a NULL pointer dereference."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "24376",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24376"
},
{
"name": "27227",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27227"
},
{
"name": "26664",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26664"
},
{
"name": "SUSE-SA:2007:051",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_51_kernel.html"
},
{
"name": "ADV-2007-2105",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2105"
},
{
"name": "SUSE-SA:2007:053",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_53_kernel.html"
},
{
"name": "SUSE-SA:2007:043",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_43_kernel.html"
},
{
"name": "26289",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26289"
},
{
"name": "25838",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25838"
},
{
"name": "MDKSA-2007:171",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:171"
},
{
"name": "USN-510-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-510-1"
},
{
"name": "DSA-1356",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1356"
},
{
"name": "26760",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26760"
},
{
"name": "RHSA-2007:0705",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0705.html"
},
{
"name": "26620",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26620"
},
{
"name": "USN-489-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-489-1"
},
{
"name": "MDKSA-2007:196",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:196"
},
{
"name": "kernel-sctpnew-dos(34777)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34777"
},
{
"name": "[linux-kernel] 20070608 Linux 2.6.21.4",
"refsource": "MLIST",
"url": "http://marc.info/?l=linux-kernel\u0026m=118128622431272\u0026w=2"
},
{
"name": "25961",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25961"
},
{
"name": "oval:org.mitre.oval:def:10116",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10116"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm"
},
{
"name": "USN-486-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-486-1"
},
{
"name": "26450",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26450"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4"
},
{
"name": "37112",
"refsource": "OSVDB",
"url": "http://osvdb.org/37112"
},
{
"name": "[linux-kernel] 20070608 Linux 2.6.20.13",
"refsource": "MLIST",
"url": "http://marc.info/?l=linux-kernel\u0026m=118128610219959\u0026w=2"
},
{
"name": "26139",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26139"
},
{
"name": "RHSA-2007:0488",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0488.html"
},
{
"name": "26133",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26133"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2007-2876",
"datePublished": "2007-06-11T23:00:00.000Z",
"dateReserved": "2007-05-29T00:00:00.000Z",
"dateUpdated": "2024-08-07T13:57:54.199Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2007-2876",
"date": "2026-05-21",
"epss": "0.02674",
"percentile": "0.86001"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"142BCD48-8387-4D0C-A052-44DD4144CBFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*\", \"matchCriteriaId\": \"7BCA84E2-AC4A-430D-8A30-E660D2A232A0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*\", \"matchCriteriaId\": \"2255842B-34CD-4062-886C-37161A065703\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*\", \"matchCriteriaId\": \"F0ED322D-004C-472E-A37F-89B78C55FE5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*\", \"matchCriteriaId\": \"412F7334-C46B-4F61-B38A-2CA56B498151\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*\", \"matchCriteriaId\": \"5967AF83-798D-4B1E-882A-5737FFC859C9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*\", \"matchCriteriaId\": \"A90D2123-D55B-4104-8D82-5B6365AA3B77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*\", \"matchCriteriaId\": \"DCCDFD49-D402-420E-92F5-20445A0FE139\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A073700-E8A9-4F76-9265-2BE0D5AC9909\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*\", \"matchCriteriaId\": \"8877D178-1655-46E9-8F5A-2DD576601F38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D55059C-B867-4E0F-B29C-9CD2C86915A5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*\", \"matchCriteriaId\": \"8358E965-3689-4B05-8470-C4A1463FA0E9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8220D81-9065-471F-9256-CFE7B9941555\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D2A55C17-C530-4898-BC95-DE4D495F0D7C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C14A949-E2B8-4100-8ED4-645CB996B08A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"81941077-0011-4272-A8C7-21D0AFE7DECB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB445E3E-CCBD-4737-BE30-841B9A79D558\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B2EDDD7-5B3E-45AA-BC42-A6FF516B8F57\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"02F89C7A-24F2-4518-A605-78A5B7056A1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C43BA02-0686-42F0-B901-4CB88459E2D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F5301E27-8021-467C-A9A2-AF2137EF0299\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"59393187-1D1E-45CD-BE0E-385F978E4834\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0CCDF6B-0365-4553-B161-3F6D68A58F72\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9B2BB71-0489-40F6-9CB6-A95B96E92106\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.3:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"842ECCE2-60F0-41C0-9EAA-A43AF97F61AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79787868-2D77-4B55-AD61-C2B357CCE047\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"05F0391C-D4CC-4652-A24C-DC47F4C3DC91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"56340FF9-EE77-4EB3-9720-240FAAEF39F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"79EB0E94-6AE8-4703-96BD-B927E0F2893F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B3F27D3-8F1D-4576-A584-1E2059CC67B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A1F1242-0F07-4D81-9175-3BA5B2C7B564\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"3ECBCF2E-95B3-4BE9-9B93-6390AB578C7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CF4EC75-06A2-4BD4-A39A-183F00C46E11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB5D260C-AE1C-47E9-A88C-B9C2B4349249\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0934C49-5F88-4189-BD88-2F32C39C2F25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFC3618C-FBE8-4F7C-BECE-F2CDDF785599\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6501752-2595-4412-9140-C78EB9FD41CE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA9958C6-AB7D-4B67-9AA7-42B628CBC391\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"14B0A230-4054-4483-A3A7-9A5A286C7552\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D78F881-DB3A-423A-8DAD-314645B2B3EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"D77D4CC4-7008-4E6F-A8CA-62DA244BB3AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C16E3D04-EC66-41FD-9CFA-FE0C21952CAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"F90242EF-048B-4539-AA41-87AA84875A9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"3C4E9325-2A70-4E15-9AAF-5588BF218055\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"01402A85-B681-4DE0-B7BB-F52567DA29E2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"70D1E088-5A9B-4CBF-A4FF-969201942CCC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"455E647F-73DD-400A-AA19-3D93FE2E57AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ABEBD63E-6194-4CB4-A1CE-E4FBB6F0A6E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B812DFE2-6FFA-4D31-839C-0CCB2B1310EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"FC106BDA-2EA4-41A2-AA01-6352A5C255B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB515243-7519-4CA4-9267-D9A6798CBC49\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"B672E1B6-E8E9-473F-853F-906EA56D712E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EA23C4F-0848-4680-ACB0-CBC57D3F8C5E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2CDE1E92-C64D-4A3B-95A2-384BD772B28B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F727CD3-D3C2-4648-9EC5-092DF3F73B13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B130EB7-A951-4717-A906-E2F602F7B69F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1765065-ABE5-478C-9ACC-EFFA8E4A7043\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D90502F-EC45-4ADC-9428-B94346DA660B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8DE0233-BE28-4C0A-B9FB-2157F41F8D4F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"2422569B-02ED-4028-83D8-D778657596B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"E66E4653-1A55-4827-888B-E0776E32ED28\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"6C8994CB-7F94-43FB-8B84-06AEBB34EAE0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"95DD4647-564E-4067-A945-F52232C0A33A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1CD39A7A-9172-4B85-B8FE-CEB94207A897\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"81DE32C2-5B07-4812-9F88-000F5FB000C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"02EED3D5-8F89-4B7F-A34B-52274B1A754F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F87AA89-F377-4BEB-B69F-809F5DA6176C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C27AF62E-A026-43E9-89E6-CD807CE9DF51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79C2AE0E-DAE8-4443-B33F-6ABA9019AA88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D343B121-C007-49F8-9DE8-AA05CE58FF0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7936B7EE-9CD1-4698-AD67-C619D0171A88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A0370A2-0A23-4E34-A2AC-8D87D051B0B1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5738D628-0B2D-4F56-9427-2009BFCB6C11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.11_rc1_bk6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E20AD05-586B-4493-9793-3FF8028CF887\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F43EBCB4-FCF4-479A-A44D-D913F7F09C77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"169446DE-67F8-4738-91FE-ED8058118F80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F76C298-81DC-43E4-8FC9-DC005A2116EF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"0AB349B2-3F78-4197-882B-90ADB3BF645A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AC88830-A9BC-4607-B572-A4B502FC9FD0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"476CB3A5-D022-4F13-AAEF-CB6A5785516A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"8CFD5CDD-1709-44C7-82BD-BAFDC46990D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"860F9225-8A3F-492C-B72B-5EFFB322802C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57E23724-2CA4-4211-BB83-38661BE7E6AF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D7BBB5F-44F7-467F-B934-33ABF744A107\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0478831E-87B2-441F-AEC2-403A35FED1D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6143DC1F-D62E-4DB2-AF43-30A07413D68B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"93F0834D-C5EA-4C96-8D6C-3123ECF78F8C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1784CBC-BEAF-48E5-95A4-2A4BD5F9F1BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"31523E67-5E4F-43F7-9410-20CB3F287DAF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D9F976B-1328-40FE-A1F2-C1DF3F836604\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B627DE3-2702-4EB2-9733-253D315FB594\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"10E1B011-8D20-448E-9DD5-023DD30D1FE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A29A4BC-0442-458E-A874-BF0D0F2870FC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"298266AB-2A36-4606-BF80-2185FC56C4D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7C2658CA-56C2-494F-AC42-618EC413CBDF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD34526D-F2CC-44C5-991D-B1E41C327860\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2F0B900-34E9-4545-B7AE-AF0A4363EACE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B36F432D-FED1-4B8D-A458-BEDEEF306AB1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5220F0FE-C4CC-4E75-A16A-4ADCABA7E8B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"04F25DE0-CA8E-4F57-87A5-C30D89CC9E44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"F87F764B-4097-44FA-B96E-A5DA75E31F7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"D7025803-C679-44DB-ADEE-864E6CAAD9B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"24B879D6-4631-49A8-9366-75577DFB755D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5B76C21-70C8-4911-A24B-270F876EF7C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25379B32-D898-4E44-A740-978A129B5E05\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B90F8F2-9549-413D-9676-3EF634D832B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"915E64EF-6EEC-4DE2-A285-5F3FCE389645\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"585BEE46-088A-494E-8E18-03F33F6BBEA5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFF35478-B292-4A00-B985-CEEDE8B212C3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E85846A-61BE-4896-B4A6-42A7E1DBA515\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D6E3B925-031D-4F6D-915A-A16F0FFA878C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7344B707-6145-48BA-8BC9-9B140A260BCF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"390B1E09-7014-4A74-834C-806BBEBAF6F4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEF02479-2124-4655-A38D-A4793D3B8A1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FB5CF04-B5B6-4DFB-B051-61EDA257019F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"A89DC9CD-C06F-4B9B-B376-900E65016296\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"15BED7A7-3E96-43EF-8B6F-3C94897C3AA1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C6FCAC4-B6C6-4125-B3AC-F30407AA7738\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"707ECC75-65B6-4B02-BE85-A4804549A2DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9BFCEA98-C708-4E1E-B189-E6F96D28F07A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B753112-CCDE-4870-AA97-4AAA2946421A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79B3AFE7-F4FF-4144-9046-E5926E305A03\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7616E197-ACCA-4191-A513-FD48417C7F88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7EE2F94D-E8E0-4BB7-A910-378012580025\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66F5AE3B-B701-4579-B44A-0F7A4267852E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1EBB1A21-3826-4BC5-A243-AF8F8D1D4728\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"34E60197-56C3-485C-9609-B1C4A0E0FCB2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1369C4A-EF3B-4805-9046-ADA38ED940C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC3639E1-B5E4-4DD6-80D4-BA07D192C42D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"54393D69-B368-4296-9798-D81570495C6C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"6791A801-9E06-47DD-912F-D8594E2F6B3F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"AE90CCED-3A5B-46E3-A6B0-4865AB786289\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"CBFF6DE7-6D7C-469A-9B2D-2F6E915F55B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86E452E4-45A9-4469-BF69-F40B6598F0EA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C5751AC4-A60F-42C6-88E5-FC8CFEE6F696\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48777A01-8F36-4752-8F7A-1D1686C69A33\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42DA6A18-5AA1-4920-94C6-8D0BB73C5352\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E51F0211-2D3E-4260-AD63-E83AE4EC4AF8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C4E1245-C6BB-462C-9E27-C608595DAE3C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"747F1324-AEFA-496F-9447-12CD13114F60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"795C3B17-687E-4F33-AA99-8FEC16F14693\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6B81A4DD-2ADE-4455-B517-5E4E0532D5A1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4BD589CC-666B-4FAA-BCF0-91C484BDDB09\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4CD622EE-A840-42E1-B6BF-4AA27D039B12\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"900D6742-DE0F-45C5-A812-BF84088CB02A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"225CA94C-8C84-4FA6-95D0-160A0016FBFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D88ED3C4-64C5-44B2-9F23-E16087046C40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"03FB31E5-190C-489A-AB30-910D2CC854F2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EF4A781A-4A41-466F-8426-10B40CF8BA1A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9ED29B3F-456B-4767-8E59-8C19A3B7E1D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6316369-B54A-4E59-A022-E0610353B284\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"073C3CE0-E12D-4545-8460-5A1514271D50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"670FAA25-A86F-4E04-A3A0-0B3FF6CF9C26\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AEB33DEA-13C7-4B36-AB8A-ED680679A071\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"86DD0FCC-BB12-410D-8C82-AB99C7C5311E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83700989-8820-48DA-A9FE-6A77DF1E8439\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC9F4CEC-7781-468B-B460-4F487B7C6601\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"67C75A62-8807-4821-9362-1E0D63C0A1B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"894D4812-D62F-489E-8D0E-5E9468CE8EC9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1F92E01-4F08-4364-9E87-FFBC095E32E7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F9960640-F02D-4E81-A34B-1893D8FD7F38\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D9D00DAD-4F2D-45C7-B87C-85118D9DD855\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C398D26-7132-4A6E-9003-77246644451B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EED2DA2-2516-42E9-8A33-0FA64BF51DB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF425F00-41BA-4F59-A0DE-6362A1E9A142\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"33577E79-1B6E-406D-A49B-2CEF1754F5D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B21D90E-5172-485E-87AC-F1681604AD7F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C41F6822-92BF-43F5-8B3E-8BAF9E9A320D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"641EECFD-A985-4026-A53A-10FBE47EAD91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"47595F81-2083-4236-A0B0-E2B98DD78402\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.16_rc7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E55F2549-F813-4BD6-8933-6788D898ECB1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E86E13B-EC92-47F3-94A9-DB515313011D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"980A6C7D-6175-4A44-8377-74AA7A9FD108\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C226902-04D9-4F32-866C-20225841ECF8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6EDD210-6E7B-4BD8-96C2-2C22FEE7DE97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"655DB612-AF49-4C17-AFB9-2E33EE8E0572\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"7EE30F34-EE81-4E1E-BF9F-A7A36B78B897\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"E1F65DF2-2794-47B7-9676-CCF150683CC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6555D45B-D3B3-4455-AB1E-E513F9FB6139\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FA5E262-7825-496F-AA72-0AD6DE6F3C78\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56C6C01B-4CED-4F37-A415-0603496C27DC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE3ACE7A-A600-4ABB-B988-5D59D626DC0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F839622-3DE1-4A16-8BD2-5FA2CBF014D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC47887B-5608-47BE-85EE-563864461915\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AF39E62B-EAB4-44B0-A421-2A71B7DD8341\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"809264F1-763D-4A8F-B206-222332DD8732\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A66ED53E-3139-4972-B027-D614BFFB8628\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"85A3AB7A-1959-4A57-B83D-B2753C43649E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4A60B265-5508-4EE0-980A-44BB0966FD7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C06F0037-DE20-4B4A-977F-BFCFAB026517\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"1817C772-D367-4ABE-B835-466D31A6DC89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"C667B8E4-64EB-4A05-84FF-B2243DEF757D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"9484B41A-DFB6-4481-80D8-440C711CEA53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"53D373AF-DE6B-428E-9F0F-F1D220900A4D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2975DF7-F916-456C-BF7C-2694559E5282\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*\", \"matchCriteriaId\": \"784EB96E-2FD3-4F77-8DB6-4D6C7A928946\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D08CBC56-C820-4513-ABEC-1ABB3EFC3A15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"338BB401-8831-4094-9186-2B3CFA5903D3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E32E6BA-AFEF-44A8-B230-87DD043BB222\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F69E575B-BD1A-4E50-8D6F-131D5E08058E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20F6269B-5F6B-4413-B14D-7AE5442E4CCD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"189D1246-F975-4411-A58B-343ED90485FD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"179147E4-5247-451D-9409-545D661BC158\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"4ED4E9DD-DDAD-46A8-9AD2-9CAE406F7575\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D97ED16-D6B7-4445-889C-4D6DE2EDC49A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2C2D5D4-9A4B-4CDF-8D71-D22EB5E97D5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"DFFB2843-A867-48EC-97D7-B106C7BBAED0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6554469E-F6AE-4EB0-880E-CBFD196FEE31\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C20367B0-F722-4442-8B59-ABB0FEDB8CC8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6940324-0383-4510-BA55-770E0A6B80B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E3313D5-52E8-49B3-B145-170D9A26DA43\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D3A5FD5-4C42-4B00-8473-D5650FAED9C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"480F035A-A59D-4113-A246-DF108BB2F591\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30D39E29-B2A0-4075-84AF-994C27AB0A68\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19879317-B067-45DA-B497-21EBDDDC2521\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D220C745-28AD-4D04-B2D2-A090D229206E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E4AF8895-7BF8-458E-B2BB-68699AABC023\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA768A9D-6C63-405E-9D14-5D68F8E93A91\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FF495E58-DA6C-402D-B381-4929CB8A502B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A591301C-C30F-44AC-90F0-709A18AA96E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7D2606B-00A6-4FA3-A00D-B1E8A80B947C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"610A93BB-70E3-4BF1-83E8-8A7388477F44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"50B422D1-6C6E-4359-A169-3EED78A1CF40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8CBD2D9-3765-40B2-A056-D71BE750CC01\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*\", \"matchCriteriaId\": \"A8F4D967-ED04-42EA-8B3E-36301D39D651\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*\", \"matchCriteriaId\": \"C498EE89-7F07-4B1E-90E6-5897E6B04670\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*\", \"matchCriteriaId\": \"708656AF-92AE-4EAF-AF19-F457DB04ADB7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B263AB8-74A4-4C73-915C-A02724C24B45\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*\", \"matchCriteriaId\": \"A96D739B-9E8B-4D2F-9DED-4C9B313473CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*\", \"matchCriteriaId\": \"4ACDEFEE-B946-4232-8BD5-A9F7AA84ED85\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2F19064-CFBF-4B3C-A0A1-CE62265CD592\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"608FDE1E-B02A-45A2-8877-0E52A5BD0963\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by causing certain invalid states that trigger a NULL pointer dereference.\"}, {\"lang\": \"es\", \"value\": \"La funci\\u00f3n sctp_new en (1) ip_conntrack_proto_sctp.c y (2) nf_conntrack_proto_sctp.c en Netfilter en Linux kernel 2.6 anterior a 2.6.20.13, y 2.6.21.x anterior a 2.6.21.4, permite a atacantes remotos provocar denegaci\\u00f3n de servicio provocando ciertos estados no v\\u00e1lidos que disparan un puntero NULL referenciado.\"}]",
"id": "CVE-2007-2876",
"lastModified": "2024-11-21T00:31:52.410",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:A/AC:L/Au:N/C:N/I:N/A:C\", \"baseScore\": 6.1, \"accessVector\": \"ADJACENT_NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 6.5, \"impactScore\": 6.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2007-06-11T23:30:00.000",
"references": "[{\"url\": \"http://marc.info/?l=linux-kernel\u0026m=118128610219959\u0026w=2\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://marc.info/?l=linux-kernel\u0026m=118128622431272\u0026w=2\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://osvdb.org/37112\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2007-0488.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/25838\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/25961\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/26133\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/26139\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/26289\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/26450\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/26620\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/26664\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/26760\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://secunia.com/advisories/27227\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.debian.org/security/2007/dsa-1356\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2007:171\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2007:196\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2007_43_kernel.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2007_51_kernel.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2007_53_kernel.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-0705.html\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.securityfocus.com/bid/24376\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-486-1\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-489-1\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-510-1\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/2105\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/34777\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10116\", \"source\": \"secalert@redhat.com\"}, {\"url\": \"http://marc.info/?l=linux-kernel\u0026m=118128610219959\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=linux-kernel\u0026m=118128622431272\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://osvdb.org/37112\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://rhn.redhat.com/errata/RHSA-2007-0488.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/25838\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/25961\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/26133\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/26139\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/26289\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/26450\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/26620\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/26664\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/26760\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/27227\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2007/dsa-1356\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2007:171\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDKSA-2007:196\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2007_43_kernel.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2007_51_kernel.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.novell.com/linux/security/advisories/2007_53_kernel.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.redhat.com/support/errata/RHSA-2007-0705.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/24376\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-486-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-489-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-510-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.vupen.com/english/advisories/2007/2105\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/34777\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10116\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2007-2876\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2007-06-11T23:30:00.000\",\"lastModified\":\"2026-04-23T00:35:47.467\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by causing certain invalid states that trigger a NULL pointer dereference.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n sctp_new en (1) ip_conntrack_proto_sctp.c y (2) nf_conntrack_proto_sctp.c en Netfilter en Linux kernel 2.6 anterior a 2.6.20.13, y 2.6.21.x anterior a 2.6.21.4, permite a atacantes remotos provocar denegaci\u00f3n de servicio provocando ciertos estados no v\u00e1lidos que disparan un puntero NULL referenciado.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:A/AC:L/Au:N/C:N/I:N/A:C\",\"baseScore\":6.1,\"accessVector\":\"ADJACENT_NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":6.5,\"impactScore\":6.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"142BCD48-8387-4D0C-A052-44DD4144CBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BCA84E2-AC4A-430D-8A30-E660D2A232A0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*\",\"matchCriteriaId\":\"2255842B-34CD-4062-886C-37161A065703\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0ED322D-004C-472E-A37F-89B78C55FE5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*\",\"matchCriteriaId\":\"412F7334-C46B-4F61-B38A-2CA56B498151\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5967AF83-798D-4B1E-882A-5737FFC859C9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A90D2123-D55B-4104-8D82-5B6365AA3B77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCCDFD49-D402-420E-92F5-20445A0FE139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A073700-E8A9-4F76-9265-2BE0D5AC9909\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*\",\"matchCriteriaId\":\"8877D178-1655-46E9-8F5A-2DD576601F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D55059C-B867-4E0F-B29C-9CD2C86915A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*\",\"matchCriteriaId\":\"8358E965-3689-4B05-8470-C4A1463FA0E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8220D81-9065-471F-9256-CFE7B9941555\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D2A55C17-C530-4898-BC95-DE4D495F0D7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C14A949-E2B8-4100-8ED4-645CB996B08A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"81941077-0011-4272-A8C7-21D0AFE7DECB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB445E3E-CCBD-4737-BE30-841B9A79D558\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B2EDDD7-5B3E-45AA-BC42-A6FF516B8F57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"02F89C7A-24F2-4518-A605-78A5B7056A1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C43BA02-0686-42F0-B901-4CB88459E2D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5301E27-8021-467C-A9A2-AF2137EF0299\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"59393187-1D1E-45CD-BE0E-385F978E4834\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0CCDF6B-0365-4553-B161-3F6D68A58F72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9B2BB71-0489-40F6-9CB6-A95B96E92106\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.3:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"842ECCE2-60F0-41C0-9EAA-A43AF97F61AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79787868-2D77-4B55-AD61-C2B357CCE047\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"05F0391C-D4CC-4652-A24C-DC47F4C3DC91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"56340FF9-EE77-4EB3-9720-240FAAEF39F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"79EB0E94-6AE8-4703-96BD-B927E0F2893F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B3F27D3-8F1D-4576-A584-1E2059CC67B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A1F1242-0F07-4D81-9175-3BA5B2C7B564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ECBCF2E-95B3-4BE9-9B93-6390AB578C7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CF4EC75-06A2-4BD4-A39A-183F00C46E11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB5D260C-AE1C-47E9-A88C-B9C2B4349249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0934C49-5F88-4189-BD88-2F32C39C2F25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFC3618C-FBE8-4F7C-BECE-F2CDDF785599\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6501752-2595-4412-9140-C78EB9FD41CE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA9958C6-AB7D-4B67-9AA7-42B628CBC391\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"14B0A230-4054-4483-A3A7-9A5A286C7552\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D78F881-DB3A-423A-8DAD-314645B2B3EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D77D4CC4-7008-4E6F-A8CA-62DA244BB3AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C16E3D04-EC66-41FD-9CFA-FE0C21952CAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F90242EF-048B-4539-AA41-87AA84875A9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"3C4E9325-2A70-4E15-9AAF-5588BF218055\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"01402A85-B681-4DE0-B7BB-F52567DA29E2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"70D1E088-5A9B-4CBF-A4FF-969201942CCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"455E647F-73DD-400A-AA19-3D93FE2E57AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABEBD63E-6194-4CB4-A1CE-E4FBB6F0A6E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B812DFE2-6FFA-4D31-839C-0CCB2B1310EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC106BDA-2EA4-41A2-AA01-6352A5C255B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB515243-7519-4CA4-9267-D9A6798CBC49\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B672E1B6-E8E9-473F-853F-906EA56D712E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EA23C4F-0848-4680-ACB0-CBC57D3F8C5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CDE1E92-C64D-4A3B-95A2-384BD772B28B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F727CD3-D3C2-4648-9EC5-092DF3F73B13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B130EB7-A951-4717-A906-E2F602F7B69F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1765065-ABE5-478C-9ACC-EFFA8E4A7043\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D90502F-EC45-4ADC-9428-B94346DA660B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8DE0233-BE28-4C0A-B9FB-2157F41F8D4F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"2422569B-02ED-4028-83D8-D778657596B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E66E4653-1A55-4827-888B-E0776E32ED28\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C8994CB-7F94-43FB-8B84-06AEBB34EAE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"95DD4647-564E-4067-A945-F52232C0A33A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CD39A7A-9172-4B85-B8FE-CEB94207A897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"81DE32C2-5B07-4812-9F88-000F5FB000C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"02EED3D5-8F89-4B7F-A34B-52274B1A754F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F87AA89-F377-4BEB-B69F-809F5DA6176C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C27AF62E-A026-43E9-89E6-CD807CE9DF51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79C2AE0E-DAE8-4443-B33F-6ABA9019AA88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D343B121-C007-49F8-9DE8-AA05CE58FF0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7936B7EE-9CD1-4698-AD67-C619D0171A88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A0370A2-0A23-4E34-A2AC-8D87D051B0B1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5738D628-0B2D-4F56-9427-2009BFCB6C11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.11_rc1_bk6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E20AD05-586B-4493-9793-3FF8028CF887\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F43EBCB4-FCF4-479A-A44D-D913F7F09C77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"169446DE-67F8-4738-91FE-ED8058118F80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F76C298-81DC-43E4-8FC9-DC005A2116EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AB349B2-3F78-4197-882B-90ADB3BF645A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AC88830-A9BC-4607-B572-A4B502FC9FD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"476CB3A5-D022-4F13-AAEF-CB6A5785516A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CFD5CDD-1709-44C7-82BD-BAFDC46990D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"860F9225-8A3F-492C-B72B-5EFFB322802C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57E23724-2CA4-4211-BB83-38661BE7E6AF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D7BBB5F-44F7-467F-B934-33ABF744A107\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0478831E-87B2-441F-AEC2-403A35FED1D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6143DC1F-D62E-4DB2-AF43-30A07413D68B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"93F0834D-C5EA-4C96-8D6C-3123ECF78F8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1784CBC-BEAF-48E5-95A4-2A4BD5F9F1BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"31523E67-5E4F-43F7-9410-20CB3F287DAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D9F976B-1328-40FE-A1F2-C1DF3F836604\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B627DE3-2702-4EB2-9733-253D315FB594\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"10E1B011-8D20-448E-9DD5-023DD30D1FE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A29A4BC-0442-458E-A874-BF0D0F2870FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"298266AB-2A36-4606-BF80-2185FC56C4D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C2658CA-56C2-494F-AC42-618EC413CBDF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD34526D-F2CC-44C5-991D-B1E41C327860\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2F0B900-34E9-4545-B7AE-AF0A4363EACE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B36F432D-FED1-4B8D-A458-BEDEEF306AB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5220F0FE-C4CC-4E75-A16A-4ADCABA7E8B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"04F25DE0-CA8E-4F57-87A5-C30D89CC9E44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F87F764B-4097-44FA-B96E-A5DA75E31F7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7025803-C679-44DB-ADEE-864E6CAAD9B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"24B879D6-4631-49A8-9366-75577DFB755D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5B76C21-70C8-4911-A24B-270F876EF7C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25379B32-D898-4E44-A740-978A129B5E05\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B90F8F2-9549-413D-9676-3EF634D832B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"915E64EF-6EEC-4DE2-A285-5F3FCE389645\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"585BEE46-088A-494E-8E18-03F33F6BBEA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFF35478-B292-4A00-B985-CEEDE8B212C3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E85846A-61BE-4896-B4A6-42A7E1DBA515\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D6E3B925-031D-4F6D-915A-A16F0FFA878C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7344B707-6145-48BA-8BC9-9B140A260BCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"390B1E09-7014-4A74-834C-806BBEBAF6F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEF02479-2124-4655-A38D-A4793D3B8A1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FB5CF04-B5B6-4DFB-B051-61EDA257019F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"A89DC9CD-C06F-4B9B-B376-900E65016296\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"15BED7A7-3E96-43EF-8B6F-3C94897C3AA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C6FCAC4-B6C6-4125-B3AC-F30407AA7738\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"707ECC75-65B6-4B02-BE85-A4804549A2DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BFCEA98-C708-4E1E-B189-E6F96D28F07A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B753112-CCDE-4870-AA97-4AAA2946421A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79B3AFE7-F4FF-4144-9046-E5926E305A03\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7616E197-ACCA-4191-A513-FD48417C7F88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE2F94D-E8E0-4BB7-A910-378012580025\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66F5AE3B-B701-4579-B44A-0F7A4267852E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1EBB1A21-3826-4BC5-A243-AF8F8D1D4728\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34E60197-56C3-485C-9609-B1C4A0E0FCB2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1369C4A-EF3B-4805-9046-ADA38ED940C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC3639E1-B5E4-4DD6-80D4-BA07D192C42D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"54393D69-B368-4296-9798-D81570495C6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"6791A801-9E06-47DD-912F-D8594E2F6B3F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE90CCED-3A5B-46E3-A6B0-4865AB786289\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"CBFF6DE7-6D7C-469A-9B2D-2F6E915F55B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86E452E4-45A9-4469-BF69-F40B6598F0EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5751AC4-A60F-42C6-88E5-FC8CFEE6F696\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48777A01-8F36-4752-8F7A-1D1686C69A33\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42DA6A18-5AA1-4920-94C6-8D0BB73C5352\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E51F0211-2D3E-4260-AD63-E83AE4EC4AF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C4E1245-C6BB-462C-9E27-C608595DAE3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"747F1324-AEFA-496F-9447-12CD13114F60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"795C3B17-687E-4F33-AA99-8FEC16F14693\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6B81A4DD-2ADE-4455-B517-5E4E0532D5A1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4BD589CC-666B-4FAA-BCF0-91C484BDDB09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4CD622EE-A840-42E1-B6BF-4AA27D039B12\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"900D6742-DE0F-45C5-A812-BF84088CB02A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"225CA94C-8C84-4FA6-95D0-160A0016FBFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D88ED3C4-64C5-44B2-9F23-E16087046C40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"03FB31E5-190C-489A-AB30-910D2CC854F2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EF4A781A-4A41-466F-8426-10B40CF8BA1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9ED29B3F-456B-4767-8E59-8C19A3B7E1D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6316369-B54A-4E59-A022-E0610353B284\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"073C3CE0-E12D-4545-8460-5A1514271D50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"670FAA25-A86F-4E04-A3A0-0B3FF6CF9C26\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AEB33DEA-13C7-4B36-AB8A-ED680679A071\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86DD0FCC-BB12-410D-8C82-AB99C7C5311E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83700989-8820-48DA-A9FE-6A77DF1E8439\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC9F4CEC-7781-468B-B460-4F487B7C6601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67C75A62-8807-4821-9362-1E0D63C0A1B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"894D4812-D62F-489E-8D0E-5E9468CE8EC9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F92E01-4F08-4364-9E87-FFBC095E32E7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9960640-F02D-4E81-A34B-1893D8FD7F38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9D00DAD-4F2D-45C7-B87C-85118D9DD855\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C398D26-7132-4A6E-9003-77246644451B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EED2DA2-2516-42E9-8A33-0FA64BF51DB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF425F00-41BA-4F59-A0DE-6362A1E9A142\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33577E79-1B6E-406D-A49B-2CEF1754F5D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B21D90E-5172-485E-87AC-F1681604AD7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C41F6822-92BF-43F5-8B3E-8BAF9E9A320D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"641EECFD-A985-4026-A53A-10FBE47EAD91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"47595F81-2083-4236-A0B0-E2B98DD78402\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.16_rc7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E55F2549-F813-4BD6-8933-6788D898ECB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E86E13B-EC92-47F3-94A9-DB515313011D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"980A6C7D-6175-4A44-8377-74AA7A9FD108\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C226902-04D9-4F32-866C-20225841ECF8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6EDD210-6E7B-4BD8-96C2-2C22FEE7DE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"655DB612-AF49-4C17-AFB9-2E33EE8E0572\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EE30F34-EE81-4E1E-BF9F-A7A36B78B897\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"E1F65DF2-2794-47B7-9676-CCF150683CC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6555D45B-D3B3-4455-AB1E-E513F9FB6139\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FA5E262-7825-496F-AA72-0AD6DE6F3C78\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56C6C01B-4CED-4F37-A415-0603496C27DC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE3ACE7A-A600-4ABB-B988-5D59D626DC0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F839622-3DE1-4A16-8BD2-5FA2CBF014D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC47887B-5608-47BE-85EE-563864461915\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF39E62B-EAB4-44B0-A421-2A71B7DD8341\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"809264F1-763D-4A8F-B206-222332DD8732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A66ED53E-3139-4972-B027-D614BFFB8628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"85A3AB7A-1959-4A57-B83D-B2753C43649E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A60B265-5508-4EE0-980A-44BB0966FD7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C06F0037-DE20-4B4A-977F-BFCFAB026517\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1817C772-D367-4ABE-B835-466D31A6DC89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"C667B8E4-64EB-4A05-84FF-B2243DEF757D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"9484B41A-DFB6-4481-80D8-440C711CEA53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"53D373AF-DE6B-428E-9F0F-F1D220900A4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2975DF7-F916-456C-BF7C-2694559E5282\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*\",\"matchCriteriaId\":\"784EB96E-2FD3-4F77-8DB6-4D6C7A928946\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D08CBC56-C820-4513-ABEC-1ABB3EFC3A15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"338BB401-8831-4094-9186-2B3CFA5903D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E32E6BA-AFEF-44A8-B230-87DD043BB222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F69E575B-BD1A-4E50-8D6F-131D5E08058E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F6269B-5F6B-4413-B14D-7AE5442E4CCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"189D1246-F975-4411-A58B-343ED90485FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"179147E4-5247-451D-9409-545D661BC158\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ED4E9DD-DDAD-46A8-9AD2-9CAE406F7575\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D97ED16-D6B7-4445-889C-4D6DE2EDC49A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2C2D5D4-9A4B-4CDF-8D71-D22EB5E97D5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"DFFB2843-A867-48EC-97D7-B106C7BBAED0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6554469E-F6AE-4EB0-880E-CBFD196FEE31\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C20367B0-F722-4442-8B59-ABB0FEDB8CC8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6940324-0383-4510-BA55-770E0A6B80B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E3313D5-52E8-49B3-B145-170D9A26DA43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D3A5FD5-4C42-4B00-8473-D5650FAED9C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"480F035A-A59D-4113-A246-DF108BB2F591\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30D39E29-B2A0-4075-84AF-994C27AB0A68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19879317-B067-45DA-B497-21EBDDDC2521\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D220C745-28AD-4D04-B2D2-A090D229206E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4AF8895-7BF8-458E-B2BB-68699AABC023\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA768A9D-6C63-405E-9D14-5D68F8E93A91\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FF495E58-DA6C-402D-B381-4929CB8A502B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A591301C-C30F-44AC-90F0-709A18AA96E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7D2606B-00A6-4FA3-A00D-B1E8A80B947C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"610A93BB-70E3-4BF1-83E8-8A7388477F44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"50B422D1-6C6E-4359-A169-3EED78A1CF40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8CBD2D9-3765-40B2-A056-D71BE750CC01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8F4D967-ED04-42EA-8B3E-36301D39D651\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*\",\"matchCriteriaId\":\"C498EE89-7F07-4B1E-90E6-5897E6B04670\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*\",\"matchCriteriaId\":\"708656AF-92AE-4EAF-AF19-F457DB04ADB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B263AB8-74A4-4C73-915C-A02724C24B45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*\",\"matchCriteriaId\":\"A96D739B-9E8B-4D2F-9DED-4C9B313473CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*\",\"matchCriteriaId\":\"4ACDEFEE-B946-4232-8BD5-A9F7AA84ED85\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2F19064-CFBF-4B3C-A0A1-CE62265CD592\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"608FDE1E-B02A-45A2-8877-0E52A5BD0963\"}]}]}],\"references\":[{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=118128610219959\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=118128622431272\u0026w=2\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://osvdb.org/37112\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2007-0488.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/25838\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/25961\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26133\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26139\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26289\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26450\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26620\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26664\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/26760\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://secunia.com/advisories/27227\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.debian.org/security/2007/dsa-1356\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:171\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:196\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_43_kernel.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_51_kernel.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_53_kernel.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0705.html\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.securityfocus.com/bid/24376\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-486-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-489-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.ubuntu.com/usn/usn-510-1\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/2105\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/34777\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10116\",\"source\":\"secalert@redhat.com\"},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=118128610219959\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=linux-kernel\u0026m=118128622431272\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://osvdb.org/37112\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2007-0488.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25838\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/25961\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26133\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26139\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26289\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26450\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26620\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26664\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/26760\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/27227\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2007/dsa-1356\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:171\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2007:196\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_43_kernel.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_51_kernel.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.novell.com/linux/security/advisories/2007_53_kernel.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2007-0705.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/24376\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-486-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-489-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-510-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.vupen.com/english/advisories/2007/2105\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/34777\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10116\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTA-2007-AVI-256
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités dans la branche 2.6 du noyau Linux permettent à un utilisateur malintentionné de provoquer un déni de service à distance ou de porter atteinte à la confidentialité des données.
Description
- Une vulnérabilité dans NETFILTER permet à une personne malveillante de provoquer un déni de service du système au moyen d'un paquet SCTP (Stream Control Transmission Protocol spécialement contruit (CVE-2007-2876) ;
- la seconde vulnérabilité dans la fonction cpuset_tasks_read permet à un individu malintentionné d'avoir accès en lecture à la certaine zone mémoire du noyau Linux (CVE-2007-2875) ;
- une faiblesse dans le noyau Linux lors du traitement des graines utilisées pour la création de nombres aléatoires. Cela peut fragiliser toute application s'appuyant sur ce générateur de nombre aléatoire (CVE-2007-2453).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Noyau Linux 2.6.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eNoyau Linux 2.6.\u003c/P\u003e",
"content": "## Description\n\n- Une vuln\u00e9rabilit\u00e9 dans NETFILTER permet \u00e0 une personne malveillante\n de provoquer un d\u00e9ni de service du syst\u00e8me au moyen d\u0027un paquet SCTP\n (Stream Control Transmission Protocol sp\u00e9cialement contruit\n (CVE-2007-2876) ;\n- la seconde vuln\u00e9rabilit\u00e9 dans la fonction cpuset_tasks_read permet \u00e0\n un individu malintentionn\u00e9 d\u0027avoir acc\u00e8s en lecture \u00e0 la certaine\n zone m\u00e9moire du noyau Linux (CVE-2007-2875) ;\n- une faiblesse dans le noyau Linux lors du traitement des graines\n utilis\u00e9es pour la cr\u00e9ation de nombres al\u00e9atoires. Cela peut\n fragiliser toute application s\u0027appuyant sur ce g\u00e9n\u00e9rateur de nombre\n al\u00e9atoire (CVE-2007-2453).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-2876",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2876"
},
{
"name": "CVE-2007-2875",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2875"
},
{
"name": "CVE-2007-2453",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2453"
}
],
"links": [
{
"title": "Liste des changements apport\u00e9s \u00e0 la version 2.6.21.4 du noyau Linux :",
"url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4"
}
],
"reference": "CERTA-2007-AVI-256",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-06-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s dans la branche 2.6 du noyau Linux permettent \u00e0\nun utilisateur malintentionn\u00e9 de provoquer un d\u00e9ni de service \u00e0 distance\nou de porter atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux",
"vendor_advisories": [
{
"published_at": null,
"title": "Liste des changements apport\u00e9s \u00e0 la version 2.6.21.4 du noyau Linux",
"url": null
}
]
}
CERTA-2007-AVI-256
Vulnerability from certfr_avis - Published: - Updated:
Plusieurs vulnérabilités dans la branche 2.6 du noyau Linux permettent à un utilisateur malintentionné de provoquer un déni de service à distance ou de porter atteinte à la confidentialité des données.
Description
- Une vulnérabilité dans NETFILTER permet à une personne malveillante de provoquer un déni de service du système au moyen d'un paquet SCTP (Stream Control Transmission Protocol spécialement contruit (CVE-2007-2876) ;
- la seconde vulnérabilité dans la fonction cpuset_tasks_read permet à un individu malintentionné d'avoir accès en lecture à la certaine zone mémoire du noyau Linux (CVE-2007-2875) ;
- une faiblesse dans le noyau Linux lors du traitement des graines utilisées pour la création de nombres aléatoires. Cela peut fragiliser toute application s'appuyant sur ce générateur de nombre aléatoire (CVE-2007-2453).
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Noyau Linux 2.6.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eNoyau Linux 2.6.\u003c/P\u003e",
"content": "## Description\n\n- Une vuln\u00e9rabilit\u00e9 dans NETFILTER permet \u00e0 une personne malveillante\n de provoquer un d\u00e9ni de service du syst\u00e8me au moyen d\u0027un paquet SCTP\n (Stream Control Transmission Protocol sp\u00e9cialement contruit\n (CVE-2007-2876) ;\n- la seconde vuln\u00e9rabilit\u00e9 dans la fonction cpuset_tasks_read permet \u00e0\n un individu malintentionn\u00e9 d\u0027avoir acc\u00e8s en lecture \u00e0 la certaine\n zone m\u00e9moire du noyau Linux (CVE-2007-2875) ;\n- une faiblesse dans le noyau Linux lors du traitement des graines\n utilis\u00e9es pour la cr\u00e9ation de nombres al\u00e9atoires. Cela peut\n fragiliser toute application s\u0027appuyant sur ce g\u00e9n\u00e9rateur de nombre\n al\u00e9atoire (CVE-2007-2453).\n\n## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2007-2876",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2876"
},
{
"name": "CVE-2007-2875",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2875"
},
{
"name": "CVE-2007-2453",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2453"
}
],
"links": [
{
"title": "Liste des changements apport\u00e9s \u00e0 la version 2.6.21.4 du noyau Linux :",
"url": "http://kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4"
}
],
"reference": "CERTA-2007-AVI-256",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2007-06-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "Plusieurs vuln\u00e9rabilit\u00e9s dans la branche 2.6 du noyau Linux permettent \u00e0\nun utilisateur malintentionn\u00e9 de provoquer un d\u00e9ni de service \u00e0 distance\nou de porter atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans le noyau Linux",
"vendor_advisories": [
{
"published_at": null,
"title": "Liste des changements apport\u00e9s \u00e0 la version 2.6.21.4 du noyau Linux",
"url": null
}
]
}
FKIE_CVE-2007-2876
Vulnerability from fkie_nvd - Published: 2007-06-11 23:30 - Updated: 2026-04-23 00:35{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "142BCD48-8387-4D0C-A052-44DD4144CBFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*",
"matchCriteriaId": "7BCA84E2-AC4A-430D-8A30-E660D2A232A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*",
"matchCriteriaId": "2255842B-34CD-4062-886C-37161A065703",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*",
"matchCriteriaId": "F0ED322D-004C-472E-A37F-89B78C55FE5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*",
"matchCriteriaId": "412F7334-C46B-4F61-B38A-2CA56B498151",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*",
"matchCriteriaId": "5967AF83-798D-4B1E-882A-5737FFC859C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*",
"matchCriteriaId": "A90D2123-D55B-4104-8D82-5B6365AA3B77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*",
"matchCriteriaId": "DCCDFD49-D402-420E-92F5-20445A0FE139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*",
"matchCriteriaId": "2A073700-E8A9-4F76-9265-2BE0D5AC9909",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*",
"matchCriteriaId": "8877D178-1655-46E9-8F5A-2DD576601F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*",
"matchCriteriaId": "0D55059C-B867-4E0F-B29C-9CD2C86915A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*",
"matchCriteriaId": "8358E965-3689-4B05-8470-C4A1463FA0E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E8220D81-9065-471F-9256-CFE7B9941555",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D2A55C17-C530-4898-BC95-DE4D495F0D7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2C14A949-E2B8-4100-8ED4-645CB996B08A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*",
"matchCriteriaId": "81941077-0011-4272-A8C7-21D0AFE7DECB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "EB445E3E-CCBD-4737-BE30-841B9A79D558",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "9B2EDDD7-5B3E-45AA-BC42-A6FF516B8F57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "02F89C7A-24F2-4518-A605-78A5B7056A1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*",
"matchCriteriaId": "2C43BA02-0686-42F0-B901-4CB88459E2D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F5301E27-8021-467C-A9A2-AF2137EF0299",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:*",
"matchCriteriaId": "59393187-1D1E-45CD-BE0E-385F978E4834",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:*",
"matchCriteriaId": "D0CCDF6B-0365-4553-B161-3F6D68A58F72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:*",
"matchCriteriaId": "A9B2BB71-0489-40F6-9CB6-A95B96E92106",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc4:*:*:*:*:*:*",
"matchCriteriaId": "842ECCE2-60F0-41C0-9EAA-A43AF97F61AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "79787868-2D77-4B55-AD61-C2B357CCE047",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "05F0391C-D4CC-4652-A24C-DC47F4C3DC91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:*",
"matchCriteriaId": "56340FF9-EE77-4EB3-9720-240FAAEF39F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:*",
"matchCriteriaId": "79EB0E94-6AE8-4703-96BD-B927E0F2893F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B3F27D3-8F1D-4576-A584-1E2059CC67B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:*",
"matchCriteriaId": "8A1F1242-0F07-4D81-9175-3BA5B2C7B564",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:*",
"matchCriteriaId": "3ECBCF2E-95B3-4BE9-9B93-6390AB578C7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:*",
"matchCriteriaId": "1CF4EC75-06A2-4BD4-A39A-183F00C46E11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FB5D260C-AE1C-47E9-A88C-B9C2B4349249",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "A0934C49-5F88-4189-BD88-2F32C39C2F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*",
"matchCriteriaId": "DFC3618C-FBE8-4F7C-BECE-F2CDDF785599",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:*",
"matchCriteriaId": "A6501752-2595-4412-9140-C78EB9FD41CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "AA9958C6-AB7D-4B67-9AA7-42B628CBC391",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*",
"matchCriteriaId": "14B0A230-4054-4483-A3A7-9A5A286C7552",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:*",
"matchCriteriaId": "0D78F881-DB3A-423A-8DAD-314645B2B3EB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:*",
"matchCriteriaId": "D77D4CC4-7008-4E6F-A8CA-62DA244BB3AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C16E3D04-EC66-41FD-9CFA-FE0C21952CAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*",
"matchCriteriaId": "F90242EF-048B-4539-AA41-87AA84875A9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*",
"matchCriteriaId": "3C4E9325-2A70-4E15-9AAF-5588BF218055",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*",
"matchCriteriaId": "01402A85-B681-4DE0-B7BB-F52567DA29E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*",
"matchCriteriaId": "70D1E088-5A9B-4CBF-A4FF-969201942CCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "455E647F-73DD-400A-AA19-3D93FE2E57AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "ABEBD63E-6194-4CB4-A1CE-E4FBB6F0A6E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "B812DFE2-6FFA-4D31-839C-0CCB2B1310EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*",
"matchCriteriaId": "FC106BDA-2EA4-41A2-AA01-6352A5C255B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*",
"matchCriteriaId": "FB515243-7519-4CA4-9267-D9A6798CBC49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*",
"matchCriteriaId": "B672E1B6-E8E9-473F-853F-906EA56D712E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*",
"matchCriteriaId": "0EA23C4F-0848-4680-ACB0-CBC57D3F8C5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*",
"matchCriteriaId": "2CDE1E92-C64D-4A3B-95A2-384BD772B28B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*",
"matchCriteriaId": "9F727CD3-D3C2-4648-9EC5-092DF3F73B13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4B130EB7-A951-4717-A906-E2F602F7B69F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*",
"matchCriteriaId": "D1765065-ABE5-478C-9ACC-EFFA8E4A7043",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*",
"matchCriteriaId": "9D90502F-EC45-4ADC-9428-B94346DA660B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D8DE0233-BE28-4C0A-B9FB-2157F41F8D4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*",
"matchCriteriaId": "2422569B-02ED-4028-83D8-D778657596B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*",
"matchCriteriaId": "E66E4653-1A55-4827-888B-E0776E32ED28",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*",
"matchCriteriaId": "6C8994CB-7F94-43FB-8B84-06AEBB34EAE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*",
"matchCriteriaId": "95DD4647-564E-4067-A945-F52232C0A33A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1CD39A7A-9172-4B85-B8FE-CEB94207A897",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "35F5C369-6BFB-445F-AA8B-6F6FA7C33EF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*",
"matchCriteriaId": "81DE32C2-5B07-4812-9F88-000F5FB000C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*",
"matchCriteriaId": "02EED3D5-8F89-4B7F-A34B-52274B1A754F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*",
"matchCriteriaId": "5F87AA89-F377-4BEB-B69F-809F5DA6176C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C27AF62E-A026-43E9-89E6-CD807CE9DF51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*",
"matchCriteriaId": "79C2AE0E-DAE8-4443-B33F-6ABA9019AA88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D343B121-C007-49F8-9DE8-AA05CE58FF0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*",
"matchCriteriaId": "7936B7EE-9CD1-4698-AD67-C619D0171A88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*",
"matchCriteriaId": "A1A2AA2D-5183-4C49-A59D-AEB7D9B5A69E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*",
"matchCriteriaId": "3A0370A2-0A23-4E34-A2AC-8D87D051B0B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*",
"matchCriteriaId": "5738D628-0B2D-4F56-9427-2009BFCB6C11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.11_rc1_bk6:*:*:*:*:*:*:*",
"matchCriteriaId": "6E20AD05-586B-4493-9793-3FF8028CF887",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*",
"matchCriteriaId": "F43EBCB4-FCF4-479A-A44D-D913F7F09C77",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*",
"matchCriteriaId": "169446DE-67F8-4738-91FE-ED8058118F80",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4F76C298-81DC-43E4-8FC9-DC005A2116EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*",
"matchCriteriaId": "0AB349B2-3F78-4197-882B-90ADB3BF645A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*",
"matchCriteriaId": "6AC88830-A9BC-4607-B572-A4B502FC9FD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*",
"matchCriteriaId": "476CB3A5-D022-4F13-AAEF-CB6A5785516A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8CFD5CDD-1709-44C7-82BD-BAFDC46990D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*",
"matchCriteriaId": "5C7BF3B2-CCD1-4D39-AE9C-AB24ABA57447",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*",
"matchCriteriaId": "860F9225-8A3F-492C-B72B-5EFFB322802C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*",
"matchCriteriaId": "19DFB4EF-EA1F-4680-9D97-2FDFAA4B4A25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*",
"matchCriteriaId": "57E23724-2CA4-4211-BB83-38661BE7E6AF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B0688B3F-F8F2-4C62-B7A3-08F9FDCE7A70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*",
"matchCriteriaId": "3896C4A6-C2F6-47CE-818A-7EB3DBF15BC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*",
"matchCriteriaId": "8D7BBB5F-44F7-467F-B934-33ABF744A107",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*",
"matchCriteriaId": "0478831E-87B2-441F-AEC2-403A35FED1D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*",
"matchCriteriaId": "6143DC1F-D62E-4DB2-AF43-30A07413D68B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*",
"matchCriteriaId": "93F0834D-C5EA-4C96-8D6C-3123ECF78F8C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F1784CBC-BEAF-48E5-95A4-2A4BD5F9F1BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*",
"matchCriteriaId": "31523E67-5E4F-43F7-9410-20CB3F287DAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*",
"matchCriteriaId": "5D9F976B-1328-40FE-A1F2-C1DF3F836604",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*",
"matchCriteriaId": "9B627DE3-2702-4EB2-9733-253D315FB594",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*",
"matchCriteriaId": "10E1B011-8D20-448E-9DD5-023DD30D1FE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*",
"matchCriteriaId": "2A29A4BC-0442-458E-A874-BF0D0F2870FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*",
"matchCriteriaId": "298266AB-2A36-4606-BF80-2185FC56C4D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7C2658CA-56C2-494F-AC42-618EC413CBDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AD34526D-F2CC-44C5-991D-B1E41C327860",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C2F0B900-34E9-4545-B7AE-AF0A4363EACE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*",
"matchCriteriaId": "B36F432D-FED1-4B8D-A458-BEDEEF306AB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*",
"matchCriteriaId": "5220F0FE-C4CC-4E75-A16A-4ADCABA7E8B8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*",
"matchCriteriaId": "04F25DE0-CA8E-4F57-87A5-C30D89CC9E44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*",
"matchCriteriaId": "F87F764B-4097-44FA-B96E-A5DA75E31F7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*",
"matchCriteriaId": "D7025803-C679-44DB-ADEE-864E6CAAD9B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*",
"matchCriteriaId": "24B879D6-4631-49A8-9366-75577DFB755D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*",
"matchCriteriaId": "C5B76C21-70C8-4911-A24B-270F876EF7C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "25379B32-D898-4E44-A740-978A129B5E05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7B90F8F2-9549-413D-9676-3EF634D832B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*",
"matchCriteriaId": "915E64EF-6EEC-4DE2-A285-5F3FCE389645",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*",
"matchCriteriaId": "585BEE46-088A-494E-8E18-03F33F6BBEA5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EFF35478-B292-4A00-B985-CEEDE8B212C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6E85846A-61BE-4896-B4A6-42A7E1DBA515",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*",
"matchCriteriaId": "D6E3B925-031D-4F6D-915A-A16F0FFA878C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*",
"matchCriteriaId": "7344B707-6145-48BA-8BC9-9B140A260BCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*",
"matchCriteriaId": "390B1E09-7014-4A74-834C-806BBEBAF6F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*",
"matchCriteriaId": "FEF02479-2124-4655-A38D-A4793D3B8A1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*",
"matchCriteriaId": "0FB5CF04-B5B6-4DFB-B051-61EDA257019F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*",
"matchCriteriaId": "A89DC9CD-C06F-4B9B-B376-900E65016296",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*",
"matchCriteriaId": "15BED7A7-3E96-43EF-8B6F-3C94897C3AA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*",
"matchCriteriaId": "8C6FCAC4-B6C6-4125-B3AC-F30407AA7738",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*",
"matchCriteriaId": "707ECC75-65B6-4B02-BE85-A4804549A2DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9BFCEA98-C708-4E1E-B189-E6F96D28F07A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2B753112-CCDE-4870-AA97-4AAA2946421A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*",
"matchCriteriaId": "79B3AFE7-F4FF-4144-9046-E5926E305A03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7616E197-ACCA-4191-A513-FD48417C7F88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*",
"matchCriteriaId": "ED1AA7FC-F5B9-406C-ABE4-0BE5E9889619",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7EE2F94D-E8E0-4BB7-A910-378012580025",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*",
"matchCriteriaId": "66F5AE3B-B701-4579-B44A-0F7A4267852E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1EBB1A21-3826-4BC5-A243-AF8F8D1D4728",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*",
"matchCriteriaId": "34E60197-56C3-485C-9609-B1C4A0E0FCB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*",
"matchCriteriaId": "D1369C4A-EF3B-4805-9046-ADA38ED940C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*",
"matchCriteriaId": "CC3639E1-B5E4-4DD6-80D4-BA07D192C42D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*",
"matchCriteriaId": "54393D69-B368-4296-9798-D81570495C6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*",
"matchCriteriaId": "6791A801-9E06-47DD-912F-D8594E2F6B3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*",
"matchCriteriaId": "AE90CCED-3A5B-46E3-A6B0-4865AB786289",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*",
"matchCriteriaId": "CBFF6DE7-6D7C-469A-9B2D-2F6E915F55B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*",
"matchCriteriaId": "86E452E4-45A9-4469-BF69-F40B6598F0EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*",
"matchCriteriaId": "C5751AC4-A60F-42C6-88E5-FC8CFEE6F696",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1FF886A6-7E73-47AD-B6A5-A9EC5BEDCD0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*",
"matchCriteriaId": "48777A01-8F36-4752-8F7A-1D1686C69A33",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*",
"matchCriteriaId": "42DA6A18-5AA1-4920-94C6-8D0BB73C5352",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*",
"matchCriteriaId": "992EA5DE-5A5B-4782-8B5A-BDD8D6FB1E31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*",
"matchCriteriaId": "E51F0211-2D3E-4260-AD63-E83AE4EC4AF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*",
"matchCriteriaId": "4C4E1245-C6BB-462C-9E27-C608595DAE3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*",
"matchCriteriaId": "747F1324-AEFA-496F-9447-12CD13114F60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*",
"matchCriteriaId": "795C3B17-687E-4F33-AA99-8FEC16F14693",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*",
"matchCriteriaId": "F2BDD5C7-9B6A-41B5-8679-5062B8A6E11B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*",
"matchCriteriaId": "190D5E2C-AD60-41F4-B29D-FB8EA8CB5FF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*",
"matchCriteriaId": "6B81A4DD-2ADE-4455-B517-5E4E0532D5A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4BD589CC-666B-4FAA-BCF0-91C484BDDB09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*",
"matchCriteriaId": "4CD622EE-A840-42E1-B6BF-4AA27D039B12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*",
"matchCriteriaId": "900D6742-DE0F-45C5-A812-BF84088CB02A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*",
"matchCriteriaId": "225CA94C-8C84-4FA6-95D0-160A0016FBFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*",
"matchCriteriaId": "D88ED3C4-64C5-44B2-9F23-E16087046C40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*",
"matchCriteriaId": "03FB31E5-190C-489A-AB30-910D2CC854F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*",
"matchCriteriaId": "EF4A781A-4A41-466F-8426-10B40CF8BA1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*",
"matchCriteriaId": "9ED29B3F-456B-4767-8E59-8C19A3B7E1D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*",
"matchCriteriaId": "F6316369-B54A-4E59-A022-E0610353B284",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*",
"matchCriteriaId": "073C3CE0-E12D-4545-8460-5A1514271D50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*",
"matchCriteriaId": "670FAA25-A86F-4E04-A3A0-0B3FF6CF9C26",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*",
"matchCriteriaId": "AEB33DEA-13C7-4B36-AB8A-ED680679A071",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*",
"matchCriteriaId": "86DD0FCC-BB12-410D-8C82-AB99C7C5311E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*",
"matchCriteriaId": "83700989-8820-48DA-A9FE-6A77DF1E8439",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*",
"matchCriteriaId": "CC9F4CEC-7781-468B-B460-4F487B7C6601",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*",
"matchCriteriaId": "67C75A62-8807-4821-9362-1E0D63C0A1B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*",
"matchCriteriaId": "894D4812-D62F-489E-8D0E-5E9468CE8EC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F92E01-4F08-4364-9E87-FFBC095E32E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*",
"matchCriteriaId": "F9960640-F02D-4E81-A34B-1893D8FD7F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*",
"matchCriteriaId": "D9D00DAD-4F2D-45C7-B87C-85118D9DD855",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*",
"matchCriteriaId": "0C398D26-7132-4A6E-9003-77246644451B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*",
"matchCriteriaId": "5EED2DA2-2516-42E9-8A33-0FA64BF51DB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*",
"matchCriteriaId": "FF425F00-41BA-4F59-A0DE-6362A1E9A142",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*",
"matchCriteriaId": "33577E79-1B6E-406D-A49B-2CEF1754F5D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*",
"matchCriteriaId": "8B21D90E-5172-485E-87AC-F1681604AD7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*",
"matchCriteriaId": "C41F6822-92BF-43F5-8B3E-8BAF9E9A320D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*",
"matchCriteriaId": "641EECFD-A985-4026-A53A-10FBE47EAD91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*",
"matchCriteriaId": "47595F81-2083-4236-A0B0-E2B98DD78402",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.16_rc7:*:*:*:*:*:*:*",
"matchCriteriaId": "E55F2549-F813-4BD6-8933-6788D898ECB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*",
"matchCriteriaId": "9E86E13B-EC92-47F3-94A9-DB515313011D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*",
"matchCriteriaId": "980A6C7D-6175-4A44-8377-74AA7A9FD108",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*",
"matchCriteriaId": "5C226902-04D9-4F32-866C-20225841ECF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*",
"matchCriteriaId": "C6EDD210-6E7B-4BD8-96C2-2C22FEE7DE97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*",
"matchCriteriaId": "655DB612-AF49-4C17-AFB9-2E33EE8E0572",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*",
"matchCriteriaId": "7EE30F34-EE81-4E1E-BF9F-A7A36B78B897",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*",
"matchCriteriaId": "E1F65DF2-2794-47B7-9676-CCF150683CC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*",
"matchCriteriaId": "DEB3068F-2F64-4BBC-BA3C-FB56A2FBED50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6555D45B-D3B3-4455-AB1E-E513F9FB6139",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4FA5E262-7825-496F-AA72-0AD6DE6F3C78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*",
"matchCriteriaId": "56C6C01B-4CED-4F37-A415-0603496C27DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "9E62F6FA-6C96-4AEE-8547-8C2FE1FAD998",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*",
"matchCriteriaId": "FE3ACE7A-A600-4ABB-B988-5D59D626DC0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2F839622-3DE1-4A16-8BD2-5FA2CBF014D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*",
"matchCriteriaId": "DC47887B-5608-47BE-85EE-563864461915",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*",
"matchCriteriaId": "AF39E62B-EAB4-44B0-A421-2A71B7DD8341",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*",
"matchCriteriaId": "809264F1-763D-4A8F-B206-222332DD8732",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*",
"matchCriteriaId": "A66ED53E-3139-4972-B027-D614BFFB8628",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*",
"matchCriteriaId": "85A3AB7A-1959-4A57-B83D-B2753C43649E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*",
"matchCriteriaId": "B8FB7FA3-727D-4BB9-937C-F4F5DA97FFCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*",
"matchCriteriaId": "4A60B265-5508-4EE0-980A-44BB0966FD7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*",
"matchCriteriaId": "C06F0037-DE20-4B4A-977F-BFCFAB026517",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*",
"matchCriteriaId": "1817C772-D367-4ABE-B835-466D31A6DC89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*",
"matchCriteriaId": "C667B8E4-64EB-4A05-84FF-B2243DEF757D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*",
"matchCriteriaId": "9484B41A-DFB6-4481-80D8-440C711CEA53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*",
"matchCriteriaId": "53D373AF-DE6B-428E-9F0F-F1D220900A4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*",
"matchCriteriaId": "F2975DF7-F916-456C-BF7C-2694559E5282",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*",
"matchCriteriaId": "6D156EFF-D2E5-4F42-B6E7-954DE6CD90B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*",
"matchCriteriaId": "784EB96E-2FD3-4F77-8DB6-4D6C7A928946",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D08CBC56-C820-4513-ABEC-1ABB3EFC3A15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*",
"matchCriteriaId": "338BB401-8831-4094-9186-2B3CFA5903D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1E32E6BA-AFEF-44A8-B230-87DD043BB222",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F69E575B-BD1A-4E50-8D6F-131D5E08058E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*",
"matchCriteriaId": "20F6269B-5F6B-4413-B14D-7AE5442E4CCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*",
"matchCriteriaId": "189D1246-F975-4411-A58B-343ED90485FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*",
"matchCriteriaId": "179147E4-5247-451D-9409-545D661BC158",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*",
"matchCriteriaId": "4ED4E9DD-DDAD-46A8-9AD2-9CAE406F7575",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*",
"matchCriteriaId": "8D97ED16-D6B7-4445-889C-4D6DE2EDC49A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*",
"matchCriteriaId": "B2C2D5D4-9A4B-4CDF-8D71-D22EB5E97D5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*",
"matchCriteriaId": "DFFB2843-A867-48EC-97D7-B106C7BBAED0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6554469E-F6AE-4EB0-880E-CBFD196FEE31",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2F99CFC1-DCCE-47B9-98EF-84AEDAECE02E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*",
"matchCriteriaId": "C20367B0-F722-4442-8B59-ABB0FEDB8CC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*",
"matchCriteriaId": "C6940324-0383-4510-BA55-770E0A6B80B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1E3313D5-52E8-49B3-B145-170D9A26DA43",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*",
"matchCriteriaId": "3D3A5FD5-4C42-4B00-8473-D5650FAED9C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*",
"matchCriteriaId": "480F035A-A59D-4113-A246-DF108BB2F591",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*",
"matchCriteriaId": "30D39E29-B2A0-4075-84AF-994C27AB0A68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*",
"matchCriteriaId": "19879317-B067-45DA-B497-21EBDDDC2521",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*",
"matchCriteriaId": "D220C745-28AD-4D04-B2D2-A090D229206E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*",
"matchCriteriaId": "8BC5B3A6-6CD5-448D-B910-3BAD15FDC3A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*",
"matchCriteriaId": "E4AF8895-7BF8-458E-B2BB-68699AABC023",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*",
"matchCriteriaId": "CA768A9D-6C63-405E-9D14-5D68F8E93A91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*",
"matchCriteriaId": "FF495E58-DA6C-402D-B381-4929CB8A502B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AA794BE8-1A22-4BF8-AB79-53E7BCE60D9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*",
"matchCriteriaId": "A591301C-C30F-44AC-90F0-709A18AA96E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*",
"matchCriteriaId": "F7D2606B-00A6-4FA3-A00D-B1E8A80B947C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*",
"matchCriteriaId": "610A93BB-70E3-4BF1-83E8-8A7388477F44",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*",
"matchCriteriaId": "50B422D1-6C6E-4359-A169-3EED78A1CF40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*",
"matchCriteriaId": "C8CBD2D9-3765-40B2-A056-D71BE750CC01",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*",
"matchCriteriaId": "A8F4D967-ED04-42EA-8B3E-36301D39D651",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*",
"matchCriteriaId": "C498EE89-7F07-4B1E-90E6-5897E6B04670",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*",
"matchCriteriaId": "708656AF-92AE-4EAF-AF19-F457DB04ADB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*",
"matchCriteriaId": "3B263AB8-74A4-4C73-915C-A02724C24B45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*",
"matchCriteriaId": "A96D739B-9E8B-4D2F-9DED-4C9B313473CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*",
"matchCriteriaId": "4ACDEFEE-B946-4232-8BD5-A9F7AA84ED85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6AD2E9DC-2876-4515-BCE6-DDD0CC6A5708",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A2F19064-CFBF-4B3C-A0A1-CE62265CD592",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AD3F0CEC-B8FA-47E3-BA3E-182F43D3DA86",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*",
"matchCriteriaId": "608FDE1E-B02A-45A2-8877-0E52A5BD0963",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by causing certain invalid states that trigger a NULL pointer dereference."
},
{
"lang": "es",
"value": "La funci\u00f3n sctp_new en (1) ip_conntrack_proto_sctp.c y (2) nf_conntrack_proto_sctp.c en Netfilter en Linux kernel 2.6 anterior a 2.6.20.13, y 2.6.21.x anterior a 2.6.21.4, permite a atacantes remotos provocar denegaci\u00f3n de servicio provocando ciertos estados no v\u00e1lidos que disparan un puntero NULL referenciado."
}
],
"id": "CVE-2007-2876",
"lastModified": "2026-04-23T00:35:47.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2007-06-11T23:30:00.000",
"references": [
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=linux-kernel\u0026m=118128610219959\u0026w=2"
},
{
"source": "secalert@redhat.com",
"url": "http://marc.info/?l=linux-kernel\u0026m=118128622431272\u0026w=2"
},
{
"source": "secalert@redhat.com",
"url": "http://osvdb.org/37112"
},
{
"source": "secalert@redhat.com",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0488.html"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/25838"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/25961"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/26133"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/26139"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/26289"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/26450"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/26620"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/26664"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/26760"
},
{
"source": "secalert@redhat.com",
"url": "http://secunia.com/advisories/27227"
},
{
"source": "secalert@redhat.com",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm"
},
{
"source": "secalert@redhat.com",
"url": "http://www.debian.org/security/2007/dsa-1356"
},
{
"source": "secalert@redhat.com",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:171"
},
{
"source": "secalert@redhat.com",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:196"
},
{
"source": "secalert@redhat.com",
"url": "http://www.novell.com/linux/security/advisories/2007_43_kernel.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.novell.com/linux/security/advisories/2007_51_kernel.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.novell.com/linux/security/advisories/2007_53_kernel.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0705.html"
},
{
"source": "secalert@redhat.com",
"url": "http://www.securityfocus.com/bid/24376"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/usn-486-1"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/usn-489-1"
},
{
"source": "secalert@redhat.com",
"url": "http://www.ubuntu.com/usn/usn-510-1"
},
{
"source": "secalert@redhat.com",
"url": "http://www.vupen.com/english/advisories/2007/2105"
},
{
"source": "secalert@redhat.com",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34777"
},
{
"source": "secalert@redhat.com",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10116"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=linux-kernel\u0026m=118128610219959\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://marc.info/?l=linux-kernel\u0026m=118128622431272\u0026w=2"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://osvdb.org/37112"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0488.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/25838"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/25961"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26133"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26139"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26289"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26450"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26620"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26664"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/26760"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://secunia.com/advisories/27227"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2007/dsa-1356"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:171"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:196"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.novell.com/linux/security/advisories/2007_43_kernel.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.novell.com/linux/security/advisories/2007_51_kernel.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.novell.com/linux/security/advisories/2007_53_kernel.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0705.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/24376"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-486-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-489-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-510-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.vupen.com/english/advisories/2007/2105"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34777"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10116"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-3R63-4QP5-JPPX
Vulnerability from github – Published: 2022-05-01 18:08 – Updated: 2022-05-01 18:08The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by causing certain invalid states that trigger a NULL pointer dereference.
{
"affected": [],
"aliases": [
"CVE-2007-2876"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2007-06-11T23:30:00Z",
"severity": "MODERATE"
},
"details": "The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by causing certain invalid states that trigger a NULL pointer dereference.",
"id": "GHSA-3r63-4qp5-jppx",
"modified": "2022-05-01T18:08:07Z",
"published": "2022-05-01T18:08:07Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2876"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34777"
},
{
"type": "WEB",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10116"
},
{
"type": "WEB",
"url": "http://marc.info/?l=linux-kernel\u0026m=118128610219959\u0026w=2"
},
{
"type": "WEB",
"url": "http://marc.info/?l=linux-kernel\u0026m=118128622431272\u0026w=2"
},
{
"type": "WEB",
"url": "http://osvdb.org/37112"
},
{
"type": "WEB",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0488.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/25838"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/25961"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26133"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26139"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26289"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26450"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26620"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26664"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/26760"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/27227"
},
{
"type": "WEB",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2007/dsa-1356"
},
{
"type": "WEB",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:171"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:196"
},
{
"type": "WEB",
"url": "http://www.novell.com/linux/security/advisories/2007_43_kernel.html"
},
{
"type": "WEB",
"url": "http://www.novell.com/linux/security/advisories/2007_51_kernel.html"
},
{
"type": "WEB",
"url": "http://www.novell.com/linux/security/advisories/2007_53_kernel.html"
},
{
"type": "WEB",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0705.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/24376"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-486-1"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-489-1"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-510-1"
},
{
"type": "WEB",
"url": "http://www.vupen.com/english/advisories/2007/2105"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2007-2876
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2007-2876",
"description": "The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by causing certain invalid states that trigger a NULL pointer dereference.",
"id": "GSD-2007-2876",
"references": [
"https://www.suse.com/security/cve/CVE-2007-2876.html",
"https://www.debian.org/security/2007/dsa-1356",
"https://access.redhat.com/errata/RHSA-2007:0705",
"https://access.redhat.com/errata/RHSA-2007:0488",
"https://linux.oracle.com/cve/CVE-2007-2876.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2007-2876"
],
"details": "The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by causing certain invalid states that trigger a NULL pointer dereference.",
"id": "GSD-2007-2876",
"modified": "2023-12-13T01:21:37.754424Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-2876",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by causing certain invalid states that trigger a NULL pointer dereference."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "24376",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/24376"
},
{
"name": "27227",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/27227"
},
{
"name": "26664",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26664"
},
{
"name": "SUSE-SA:2007:051",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_51_kernel.html"
},
{
"name": "ADV-2007-2105",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2007/2105"
},
{
"name": "SUSE-SA:2007:053",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_53_kernel.html"
},
{
"name": "SUSE-SA:2007:043",
"refsource": "SUSE",
"url": "http://www.novell.com/linux/security/advisories/2007_43_kernel.html"
},
{
"name": "26289",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26289"
},
{
"name": "25838",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25838"
},
{
"name": "MDKSA-2007:171",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:171"
},
{
"name": "USN-510-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-510-1"
},
{
"name": "DSA-1356",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2007/dsa-1356"
},
{
"name": "26760",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26760"
},
{
"name": "RHSA-2007:0705",
"refsource": "REDHAT",
"url": "http://www.redhat.com/support/errata/RHSA-2007-0705.html"
},
{
"name": "26620",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26620"
},
{
"name": "USN-489-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-489-1"
},
{
"name": "MDKSA-2007:196",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:196"
},
{
"name": "kernel-sctpnew-dos(34777)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34777"
},
{
"name": "[linux-kernel] 20070608 Linux 2.6.21.4",
"refsource": "MLIST",
"url": "http://marc.info/?l=linux-kernel\u0026m=118128622431272\u0026w=2"
},
{
"name": "25961",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/25961"
},
{
"name": "oval:org.mitre.oval:def:10116",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10116"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm",
"refsource": "CONFIRM",
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm"
},
{
"name": "USN-486-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-486-1"
},
{
"name": "26450",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26450"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4",
"refsource": "CONFIRM",
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4"
},
{
"name": "37112",
"refsource": "OSVDB",
"url": "http://osvdb.org/37112"
},
{
"name": "[linux-kernel] 20070608 Linux 2.6.20.13",
"refsource": "MLIST",
"url": "http://marc.info/?l=linux-kernel\u0026m=118128610219959\u0026w=2"
},
{
"name": "26139",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26139"
},
{
"name": "RHSA-2007:0488",
"refsource": "REDHAT",
"url": "http://rhn.redhat.com/errata/RHSA-2007-0488.html"
},
{
"name": "26133",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/26133"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test11:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.1:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test10:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test8:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test9:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.0:test7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.10:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.22:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16_rc7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.5:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6_test9_cvs:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11_rc1_bk6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.23:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.24:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.30:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.31:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.32:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.39:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.3:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.5:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.5:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.7:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.25:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.26:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.33:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.34:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.40:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.41:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17:rc6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.4:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.11:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.12:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.13:rc7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.14:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.15:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.27:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.28:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.35:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.36:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.16:rc5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.17.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.18:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.19:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.2:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.21:git7:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.4:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.4:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.6:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.8:rc2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.9:rc4:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2007-2876"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by causing certain invalid states that trigger a NULL pointer dereference."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[linux-kernel] 20070608 Linux 2.6.20.13",
"refsource": "MLIST",
"tags": [],
"url": "http://marc.info/?l=linux-kernel\u0026m=118128610219959\u0026w=2"
},
{
"name": "[linux-kernel] 20070608 Linux 2.6.21.4",
"refsource": "MLIST",
"tags": [],
"url": "http://marc.info/?l=linux-kernel\u0026m=118128622431272\u0026w=2"
},
{
"name": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.kernel.org/pub/linux/kernel/v2.6/ChangeLog-2.6.21.4"
},
{
"name": "http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm",
"refsource": "CONFIRM",
"tags": [],
"url": "http://support.avaya.com/elmodocs2/security/ASA-2007-287.htm"
},
{
"name": "DSA-1356",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2007/dsa-1356"
},
{
"name": "MDKSA-2007:171",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:171"
},
{
"name": "MDKSA-2007:196",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:196"
},
{
"name": "RHSA-2007:0488",
"refsource": "REDHAT",
"tags": [],
"url": "http://rhn.redhat.com/errata/RHSA-2007-0488.html"
},
{
"name": "RHSA-2007:0705",
"refsource": "REDHAT",
"tags": [],
"url": "http://www.redhat.com/support/errata/RHSA-2007-0705.html"
},
{
"name": "SUSE-SA:2007:043",
"refsource": "SUSE",
"tags": [],
"url": "http://www.novell.com/linux/security/advisories/2007_43_kernel.html"
},
{
"name": "SUSE-SA:2007:051",
"refsource": "SUSE",
"tags": [],
"url": "http://www.novell.com/linux/security/advisories/2007_51_kernel.html"
},
{
"name": "SUSE-SA:2007:053",
"refsource": "SUSE",
"tags": [],
"url": "http://www.novell.com/linux/security/advisories/2007_53_kernel.html"
},
{
"name": "USN-486-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/usn-486-1"
},
{
"name": "USN-489-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/usn-489-1"
},
{
"name": "USN-510-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/usn-510-1"
},
{
"name": "24376",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/24376"
},
{
"name": "25838",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/25838"
},
{
"name": "25961",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/25961"
},
{
"name": "26133",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/26133"
},
{
"name": "26139",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/26139"
},
{
"name": "26289",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/26289"
},
{
"name": "26450",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/26450"
},
{
"name": "26760",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/26760"
},
{
"name": "26620",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/26620"
},
{
"name": "26664",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/26664"
},
{
"name": "27227",
"refsource": "SECUNIA",
"tags": [],
"url": "http://secunia.com/advisories/27227"
},
{
"name": "ADV-2007-2105",
"refsource": "VUPEN",
"tags": [],
"url": "http://www.vupen.com/english/advisories/2007/2105"
},
{
"name": "37112",
"refsource": "OSVDB",
"tags": [],
"url": "http://osvdb.org/37112"
},
{
"name": "kernel-sctpnew-dos(34777)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34777"
},
{
"name": "oval:org.mitre.oval:def:10116",
"refsource": "OVAL",
"tags": [],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10116"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 6.5,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-10-30T16:26Z",
"publishedDate": "2007-06-11T23:30Z"
}
}
}
RHSA-2007:0488
Vulnerability from csaf_redhat - Published: 2007-06-25 17:50 - Updated: 2025-11-21 17:31The nlmclnt_mark_reclaim in clntlock.c in NFS lockd in Linux kernel before 2.6.16 allows remote attackers to cause a denial of service (process crash) and deny access to NFS exports via unspecified vectors that trigger a kernel oops (null dereference) and a deadlock.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
The compat_sys_mount function in fs/compat.c in Linux kernel 2.6.20 and earlier allows local users to cause a denial of service (NULL pointer dereference and oops) by mounting a smbfs file system in compatibility mode ("mount -t smbfs").
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
The Linux kernel before 2.6.9-42.0.8 in Red Hat 4.4 allows local users to cause a denial of service (kernel OOPS from null dereference) via fput in a 32-bit ioctl on 64-bit x86 systems, an incomplete fix of CVE-2005-3044.1.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
Linux kernel 2.6.x before 2.6.20 allows local users to read unreadable binaries by using the interpreter (PT_INTERP) functionality and triggering a core dump, a variant of CVE-2004-1073.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
A typo in Linux kernel 2.6 before 2.6.21-rc6 and 2.4 before 2.4.35 causes RTA_MAX to be used as an array size instead of RTN_MAX, which leads to an "out of bound access" by the (1) dn_fib_props (dn_fib.c, DECNet) and (2) fib_props (fib_semantics.c, IPv4) functions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
Memory leak in the PPP over Ethernet (PPPoE) socket implementation in the Linux kernel before 2.6.21-git8 allows local users to cause a denial of service (memory consumption) by creating a socket using connect, and releasing it before the PPPIOCGCHAN ioctl is initialized.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by causing certain invalid states that trigger a NULL pointer dereference.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
The sysfs_readdir function in the Linux kernel 2.6, as used in Red Hat Enterprise Linux (RHEL) 4.5 and other distributions, allows users to cause a denial of service (kernel OOPS) by dereferencing a null pointer to an inode in a dentry.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix several security issues and bugs in the\nRed Hat Enterprise Linux 4 kernel are now available.\n\nThis security advisory has been rated as having important security impact\nby the Red Hat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues described\nbelow:\n\n* a flaw in the connection tracking support for SCTP that allowed a remote\nuser to cause a denial of service by dereferencing a NULL pointer.\n(CVE-2007-2876, Important)\n\n* a flaw in the mount handling routine for 64-bit systems that allowed a\nlocal user to cause denial of service (crash). (CVE-2006-7203, Important)\n\n* a flaw in the IPv4 forwarding base that allowed a local user to cause an\nout-of-bounds access. (CVE-2007-2172, Important)\n\n* a flaw in the PPP over Ethernet implementation that allowed a local user\nto cause a denial of service (memory consumption) by creating a socket\nusing connect and then releasing it before the PPPIOCGCHAN ioctl has been\ncalled. (CVE-2007-2525, Important)\n\n* a flaw in the fput ioctl handling of 32-bit applications running on\n64-bit platforms that allowed a local user to cause a denial of service\n(panic). (CVE-2007-0773, Important)\n\n* a flaw in the NFS locking daemon that allowed a local user to cause\ndenial of service (deadlock). (CVE-2006-5158, Moderate)\n\n* a flaw in the sysfs_readdir function that allowed a local user to cause a\ndenial of service by dereferencing a NULL pointer. (CVE-2007-3104, Moderate)\n\n* a flaw in the core-dump handling that allowed a local user to create core\ndumps from unreadable binaries via PT_INTERP. (CVE-2007-0958, Low) \n\n* a flaw in the Bluetooth subsystem that allowed a local user to trigger an\ninformation leak. (CVE-2007-1353, Low)\n\nIn addition, the following bugs were addressed:\n\n* the NFS could recurse on the same spinlock. Also, NFS, under certain\nconditions, did not completely clean up Posix locks on a file close,\nleading to mount failures.\n\n* the 32bit compatibility didn\u0027t return to userspace correct values for the\nrt_sigtimedwait system call.\n\n* the count for unused inodes could be incorrect at times, resulting in\ndirty data not being written to disk in a timely manner.\n\n* the cciss driver had an incorrect disk size calculation (off-by-one\nerror) which prevented disk dumps.\n\nRed Hat would like to thank Ilja van Sprundel and the OpenVZ Linux kernel\nteam for reporting issues fixed in this erratum.\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their kernels\nto the packages associated with their machine architectures and\nconfigurations as listed in this erratum.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0488",
"url": "https://access.redhat.com/errata/RHSA-2007:0488"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "240855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=240855"
},
{
"category": "external",
"summary": "241784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=241784"
},
{
"category": "external",
"summary": "242558",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=242558"
},
{
"category": "external",
"summary": "243251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243251"
},
{
"category": "external",
"summary": "243252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243252"
},
{
"category": "external",
"summary": "243256",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243256"
},
{
"category": "external",
"summary": "243259",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243259"
},
{
"category": "external",
"summary": "243261",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243261"
},
{
"category": "external",
"summary": "243262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243262"
},
{
"category": "external",
"summary": "243263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243263"
},
{
"category": "external",
"summary": "243746",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243746"
},
{
"category": "external",
"summary": "243902",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243902"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0488.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T17:31:48+00:00",
"generator": {
"date": "2025-11-21T17:31:48+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2007:0488",
"initial_release_date": "2007-06-25T17:50:00+00:00",
"revision_history": [
{
"date": "2007-06-25T17:50:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-01-09T13:29:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:31:48+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-55.0.2.EL.i686",
"product": {
"name": "kernel-0:2.6.9-55.0.2.EL.i686",
"product_id": "kernel-0:2.6.9-55.0.2.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-55.0.2.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"product": {
"name": "kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"product_id": "kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-55.0.2.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"product": {
"name": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"product_id": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-55.0.2.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"product": {
"name": "kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"product_id": "kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-55.0.2.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-0:2.6.9-55.0.2.EL.i686",
"product": {
"name": "kernel-smp-0:2.6.9-55.0.2.EL.i686",
"product_id": "kernel-smp-0:2.6.9-55.0.2.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp@2.6.9-55.0.2.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"product_id": "kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-55.0.2.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-55.0.2.EL.i686",
"product": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.i686",
"product_id": "kernel-devel-0:2.6.9-55.0.2.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-55.0.2.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"product": {
"name": "kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"product_id": "kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-55.0.2.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"product": {
"name": "kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"product_id": "kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-55.0.2.EL?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-55.0.2.EL.ia64",
"product": {
"name": "kernel-0:2.6.9-55.0.2.EL.ia64",
"product_id": "kernel-0:2.6.9-55.0.2.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-55.0.2.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"product_id": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-55.0.2.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"product": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"product_id": "kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-55.0.2.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"product": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"product_id": "kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-55.0.2.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"product_id": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-55.0.2.EL?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-55.0.2.EL.src",
"product": {
"name": "kernel-0:2.6.9-55.0.2.EL.src",
"product_id": "kernel-0:2.6.9-55.0.2.EL.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-55.0.2.EL?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-55.0.2.EL.x86_64",
"product": {
"name": "kernel-0:2.6.9-55.0.2.EL.x86_64",
"product_id": "kernel-0:2.6.9-55.0.2.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-55.0.2.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"product": {
"name": "kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"product_id": "kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-55.0.2.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"product": {
"name": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"product_id": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-55.0.2.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"product": {
"name": "kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"product_id": "kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-55.0.2.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"product": {
"name": "kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"product_id": "kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp@2.6.9-55.0.2.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"product_id": "kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-55.0.2.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"product": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"product_id": "kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-55.0.2.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"product": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"product_id": "kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-55.0.2.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"product_id": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-55.0.2.EL?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"product": {
"name": "kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"product_id": "kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.9-55.0.2.EL?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-55.0.2.EL.ppc64",
"product": {
"name": "kernel-0:2.6.9-55.0.2.EL.ppc64",
"product_id": "kernel-0:2.6.9-55.0.2.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-55.0.2.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"product_id": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-55.0.2.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"product": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"product_id": "kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-55.0.2.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"product": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"product_id": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-55.0.2.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"product_id": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-55.0.2.EL?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"product": {
"name": "kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"product_id": "kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-55.0.2.EL?arch=ppc64iseries"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"product": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"product_id": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-55.0.2.EL?arch=ppc64iseries"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"product": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"product_id": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-55.0.2.EL?arch=ppc64iseries"
}
}
}
],
"category": "architecture",
"name": "ppc64iseries"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-55.0.2.EL.s390x",
"product": {
"name": "kernel-0:2.6.9-55.0.2.EL.s390x",
"product_id": "kernel-0:2.6.9-55.0.2.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-55.0.2.EL?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"product_id": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-55.0.2.EL?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"product": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"product_id": "kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-55.0.2.EL?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-55.0.2.EL.s390",
"product": {
"name": "kernel-0:2.6.9-55.0.2.EL.s390",
"product_id": "kernel-0:2.6.9-55.0.2.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-55.0.2.EL?arch=s390"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"product": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"product_id": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-55.0.2.EL?arch=s390"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-55.0.2.EL.s390",
"product": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.s390",
"product_id": "kernel-devel-0:2.6.9-55.0.2.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-55.0.2.EL?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-55.0.2.EL.s390"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-55.0.2.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-55.0.2.EL.src"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-55.0.2.EL.noarch as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-55.0.2.EL.s390"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-55.0.2.EL.src"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-55.0.2.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-55.0.2.EL.s390"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-55.0.2.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-55.0.2.EL.src"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-55.0.2.EL.noarch as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-55.0.2.EL.s390"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-55.0.2.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-55.0.2.EL.src"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-55.0.2.EL.noarch as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-5158",
"discovery_date": "2006-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "243251"
}
],
"notes": [
{
"category": "description",
"text": "The nlmclnt_mark_reclaim in clntlock.c in NFS lockd in Linux kernel before 2.6.16 allows remote attackers to cause a denial of service (process crash) and deny access to NFS exports via unspecified vectors that trigger a kernel oops (null dereference) and a deadlock.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "NFS lockd deadlock",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect Red Hat Enterprise Linux 2.1 or 3.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-5158"
},
{
"category": "external",
"summary": "RHBZ#243251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243251"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-5158",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5158"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5158",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5158"
}
],
"release_date": "2006-09-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-06-25T17:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0488"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "NFS lockd deadlock"
},
{
"acknowledgments": [
{
"names": [
"SWsoft Virtuozzo/OpenVZ Linux kernel team"
]
}
],
"cve": "CVE-2006-7203",
"discovery_date": "2007-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "239767"
}
],
"notes": [
{
"category": "description",
"text": "The compat_sys_mount function in fs/compat.c in Linux kernel 2.6.20 and earlier allows local users to cause a denial of service (NULL pointer dereference and oops) by mounting a smbfs file system in compatibility mode (\"mount -t smbfs\").",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "oops in compat_sys_mount() when data pointer is NULL",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-7203"
},
{
"category": "external",
"summary": "RHBZ#239767",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=239767"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-7203",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-7203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-7203"
}
],
"release_date": "2007-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-06-25T17:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0488"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "oops in compat_sys_mount() when data pointer is NULL"
},
{
"acknowledgments": [
{
"names": [
"the SWsoft Virtuozzo/OpenVZ Linux kernel team"
]
}
],
"cve": "CVE-2007-0773",
"discovery_date": "2007-02-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "243252"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel before 2.6.9-42.0.8 in Red Hat 4.4 allows local users to cause a denial of service (kernel OOPS from null dereference) via fput in a 32-bit ioctl on 64-bit x86 systems, an incomplete fix of CVE-2005-3044.1.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "lost fput in a 32-bit ioctl on 64-bit x86 systems",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-0773"
},
{
"category": "external",
"summary": "RHBZ#243252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243252"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-0773",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0773"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-0773",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0773"
}
],
"release_date": "2007-06-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-06-25T17:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0488"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "lost fput in a 32-bit ioctl on 64-bit x86 systems"
},
{
"cve": "CVE-2007-0958",
"discovery_date": "2006-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "243256"
}
],
"notes": [
{
"category": "description",
"text": "Linux kernel 2.6.x before 2.6.20 allows local users to read unreadable binaries by using the interpreter (PT_INTERP) functionality and triggering a core dump, a variant of CVE-2004-1073.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "core-dumping unreadable binaries via PT_INTERP",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-0958"
},
{
"category": "external",
"summary": "RHBZ#243256",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243256"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-0958",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0958"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-0958",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0958"
}
],
"release_date": "2007-01-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-06-25T17:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0488"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "core-dumping unreadable binaries via PT_INTERP"
},
{
"acknowledgments": [
{
"names": [
"Ilja van Sprundel"
]
}
],
"cve": "CVE-2007-1353",
"discovery_date": "2007-03-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "243259"
}
],
"notes": [
{
"category": "description",
"text": "The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Bluetooth setsockopt() information leaks",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-1353"
},
{
"category": "external",
"summary": "RHBZ#243259",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243259"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-1353",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1353"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1353",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1353"
}
],
"release_date": "2007-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-06-25T17:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0488"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Bluetooth setsockopt() information leaks"
},
{
"cve": "CVE-2007-2172",
"discovery_date": "2007-04-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "250429"
}
],
"notes": [
{
"category": "description",
"text": "A typo in Linux kernel 2.6 before 2.6.21-rc6 and 2.4 before 2.4.35 causes RTA_MAX to be used as an array size instead of RTN_MAX, which leads to an \"out of bound access\" by the (1) dn_fib_props (dn_fib.c, DECNet) and (2) fib_props (fib_semantics.c, IPv4) functions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "fib_semantics.c out of bounds access vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2172"
},
{
"category": "external",
"summary": "RHBZ#250429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250429"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2172"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2172",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2172"
}
],
"release_date": "2007-03-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-06-25T17:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0488"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "fib_semantics.c out of bounds access vulnerability"
},
{
"cve": "CVE-2007-2525",
"discovery_date": "2007-05-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "243262"
}
],
"notes": [
{
"category": "description",
"text": "Memory leak in the PPP over Ethernet (PPPoE) socket implementation in the Linux kernel before 2.6.21-git8 allows local users to cause a denial of service (memory consumption) by creating a socket using connect, and releasing it before the PPPIOCGCHAN ioctl is initialized.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "PPPoE socket PPPIOCGCHAN denial of service",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2525"
},
{
"category": "external",
"summary": "RHBZ#243262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243262"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2525",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2525"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2525",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2525"
}
],
"release_date": "2007-05-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-06-25T17:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0488"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "PPPoE socket PPPIOCGCHAN denial of service"
},
{
"cve": "CVE-2007-2876",
"discovery_date": "2007-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "245774"
}
],
"notes": [
{
"category": "description",
"text": "The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by causing certain invalid states that trigger a NULL pointer dereference.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nf}_conntrack_sctp: remotely triggerable NULL ptr dereference",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2876"
},
{
"category": "external",
"summary": "RHBZ#245774",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245774"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2876",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2876"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2876",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2876"
}
],
"release_date": "2007-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-06-25T17:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0488"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nf}_conntrack_sctp: remotely triggerable NULL ptr dereference"
},
{
"cve": "CVE-2007-3104",
"discovery_date": "2007-04-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427994"
}
],
"notes": [
{
"category": "description",
"text": "The sysfs_readdir function in the Linux kernel 2.6, as used in Red Hat Enterprise Linux (RHEL) 4.5 and other distributions, allows users to cause a denial of service (kernel OOPS) by dereferencing a null pointer to an inode in a dentry.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Null pointer to an inode in a dentry can cause an oops in sysfs_readdir",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3104"
},
{
"category": "external",
"summary": "RHBZ#427994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427994"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3104",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3104"
}
],
"release_date": "2007-06-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-06-25T17:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0488"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Null pointer to an inode in a dentry can cause an oops in sysfs_readdir"
}
]
}
RHSA-2007:0705
Vulnerability from csaf_redhat - Published: 2007-09-13 09:13 - Updated: 2025-11-21 17:32Buffer overflow in the bufprint function in capiutil.c in libcapi, as used in Linux kernel 2.6.9 to 2.6.20 and isdn4k-utils, allows local users to cause a denial of service (crash) and possibly gain privileges via a crafted CAPI packet.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
Integer underflow in the cpuset_tasks_read function in the Linux kernel before 2.6.20.13, and 2.6.21.x before 2.6.21.4, when the cpuset filesystem is mounted, allows local users to obtain kernel memory contents by using a large offset when reading the /dev/cpuset/tasks file.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by causing certain invalid states that trigger a NULL pointer dereference.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
The VFAT compat ioctls in the Linux kernel before 2.6.21.2, when run on a 64-bit system, allow local users to corrupt a kernel_dirent struct and cause a denial of service (system crash) via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
mm/mmap.c in the hugetlb kernel, when run on PowerPC systems, does not prevent stack expansion from entering into reserved kernel page memory, which allows local users to cause a denial of service (OOPS) via unspecified vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
The CIFS filesystem in the Linux kernel before 2.6.22, when Unix extension support is enabled, does not honor the umask of a process, which allows local users to gain privileges.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing despite sec=ntlmv2i in a SetupAndX request.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
The drm/i915 component in the Linux kernel before 2.6.22.2, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix various security issues in the Red Hat\nEnterprise Linux 5 kernel are now available.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the following security issues:\n\n* a flaw in the DRM driver for Intel graphics cards that allowed a local\nuser to access any part of the main memory. To access the DRM functionality\na user must have access to the X server which is granted through the\ngraphical login. This also only affected systems with an Intel 965 or later\ngraphic chipset. (CVE-2007-3851, Important)\n\n* a flaw in the VFAT compat ioctl handling on 64-bit systems that allowed a\nlocal user to corrupt a kernel_dirent struct and cause a denial of service\n(system crash). (CVE-2007-2878, Important)\n\n* a flaw in the connection tracking support for SCTP that allowed a remote\nuser to cause a denial of service by dereferencing a NULL pointer.\n(CVE-2007-2876, Important)\n\n* flaw in the CIFS filesystem which could cause the umask values of a\nprocess to not be honored. This affected CIFS filesystems where the Unix\nextensions are supported. (CVE-2007-3740, Important)\n\n* a flaw in the stack expansion when using the hugetlb kernel on PowerPC\nsystems that allowed a local user to cause a denial of service.\n(CVE-2007-3739, Moderate)\n\n* a flaw in the ISDN CAPI subsystem that allowed a remote user to cause a\ndenial of service or potential remote access. Exploitation would require\nthe attacker to be able to send arbitrary frames over the ISDN network to\nthe victim\u0027s machine. (CVE-2007-1217, Moderate)\n\n* a flaw in the cpuset support that allowed a local user to obtain\nsensitive information from kernel memory. To exploit this the cpuset\nfilesystem would have to already be mounted. (CVE-2007-2875, Moderate)\n\n* a flaw in the CIFS handling of the mount option \"sec=\" that didn\u0027t enable\nintegrity checking and didn\u0027t produce any error message. (CVE-2007-3843,\nLow)\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these packages,\nwhich contain backported patches to correct these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0705",
"url": "https://access.redhat.com/errata/RHSA-2007:0705"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#important",
"url": "http://www.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "232260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=232260"
},
{
"category": "external",
"summary": "245773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245773"
},
{
"category": "external",
"summary": "245774",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245774"
},
{
"category": "external",
"summary": "247726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247726"
},
{
"category": "external",
"summary": "251185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=251185"
},
{
"category": "external",
"summary": "253313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=253313"
},
{
"category": "external",
"summary": "253314",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=253314"
},
{
"category": "external",
"summary": "253315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=253315"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0705.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2025-11-21T17:32:01+00:00",
"generator": {
"date": "2025-11-21T17:32:01+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2007:0705",
"initial_release_date": "2007-09-13T09:13:00+00:00",
"revision_history": [
{
"date": "2007-09-13T09:13:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2007-09-13T05:21:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:32:01+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-8.1.10.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-8.1.10.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-8.1.10.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-8.1.10.el5.i686",
"product": {
"name": "kernel-0:2.6.18-8.1.10.el5.i686",
"product_id": "kernel-0:2.6.18-8.1.10.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-8.1.10.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-8.1.10.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.i686",
"product_id": "kernel-devel-0:2.6.18-8.1.10.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-8.1.10.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-8.1.10.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-8.1.10.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-8.1.10.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-8.1.10.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-8.1.10.el5.i686",
"product_id": "kernel-xen-0:2.6.18-8.1.10.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-8.1.10.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-8.1.10.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-8.1.10.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.i386",
"product_id": "kernel-headers-0:2.6.18-8.1.10.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-8.1.10.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-8.1.10.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-8.1.10.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-8.1.10.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-8.1.10.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-8.1.10.el5.x86_64",
"product_id": "kernel-0:2.6.18-8.1.10.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-8.1.10.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-8.1.10.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-8.1.10.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-8.1.10.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-8.1.10.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-8.1.10.el5.src",
"product": {
"name": "kernel-0:2.6.18-8.1.10.el5.src",
"product_id": "kernel-0:2.6.18-8.1.10.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-8.1.10.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-8.1.10.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"product_id": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-8.1.10.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"product_id": "kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-8.1.10.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"product_id": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-8.1.10.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-8.1.10.el5.ia64",
"product": {
"name": "kernel-0:2.6.18-8.1.10.el5.ia64",
"product_id": "kernel-0:2.6.18-8.1.10.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-8.1.10.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"product": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"product_id": "kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-8.1.10.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-8.1.10.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"product": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"product_id": "kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-8.1.10.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"product": {
"name": "kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"product_id": "kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-8.1.10.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"product_id": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-8.1.10.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"product_id": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-8.1.10.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-8.1.10.el5.ppc64",
"product": {
"name": "kernel-0:2.6.18-8.1.10.el5.ppc64",
"product_id": "kernel-0:2.6.18-8.1.10.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-8.1.10.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"product": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"product_id": "kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-8.1.10.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"product": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"product_id": "kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-8.1.10.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-8.1.10.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"product": {
"name": "kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"product_id": "kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-8.1.10.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"product_id": "kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-8.1.10.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"product": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"product_id": "kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-8.1.10.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"product_id": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-8.1.10.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"product_id": "kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-8.1.10.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-8.1.10.el5.s390x",
"product": {
"name": "kernel-0:2.6.18-8.1.10.el5.s390x",
"product_id": "kernel-0:2.6.18-8.1.10.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-8.1.10.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"product": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"product_id": "kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-8.1.10.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"product": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"product_id": "kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-8.1.10.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-8.1.10.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-8.1.10.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-8.1.10.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-8.1.10.el5.src"
},
"product_reference": "kernel-0:2.6.18-8.1.10.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-8.1.10.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-8.1.10.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-8.1.10.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-8.1.10.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-8.1.10.el5.src"
},
"product_reference": "kernel-0:2.6.18-8.1.10.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-8.1.10.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-1217",
"discovery_date": "2007-03-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "402741"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the bufprint function in capiutil.c in libcapi, as used in Linux kernel 2.6.9 to 2.6.20 and isdn4k-utils, allows local users to cause a denial of service (crash) and possibly gain privileges via a crafted CAPI packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: CAPI overflow",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-1217"
},
{
"category": "external",
"summary": "RHBZ#402741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=402741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-1217",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1217"
}
],
"release_date": "2007-03-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-09-13T09:13:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0705"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: CAPI overflow"
},
{
"cve": "CVE-2007-2875",
"discovery_date": "2007-06-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "245773"
}
],
"notes": [
{
"category": "description",
"text": "Integer underflow in the cpuset_tasks_read function in the Linux kernel before 2.6.20.13, and 2.6.21.x before 2.6.21.4, when the cpuset filesystem is mounted, allows local users to obtain kernel memory contents by using a large offset when reading the /dev/cpuset/tasks file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpuset information leak",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2875"
},
{
"category": "external",
"summary": "RHBZ#245773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245773"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2875",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2875"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2875",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2875"
}
],
"release_date": "2007-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-09-13T09:13:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0705"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpuset information leak"
},
{
"cve": "CVE-2007-2876",
"discovery_date": "2007-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "245774"
}
],
"notes": [
{
"category": "description",
"text": "The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by causing certain invalid states that trigger a NULL pointer dereference.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nf}_conntrack_sctp: remotely triggerable NULL ptr dereference",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2876"
},
{
"category": "external",
"summary": "RHBZ#245774",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245774"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2876",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2876"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2876",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2876"
}
],
"release_date": "2007-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-09-13T09:13:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0705"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nf}_conntrack_sctp: remotely triggerable NULL ptr dereference"
},
{
"cve": "CVE-2007-2878",
"discovery_date": "2007-05-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "247726"
}
],
"notes": [
{
"category": "description",
"text": "The VFAT compat ioctls in the Linux kernel before 2.6.21.2, when run on a 64-bit system, allow local users to corrupt a kernel_dirent struct and cause a denial of service (system crash) via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "VFAT compat ioctls DoS on 64-bit",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2878"
},
{
"category": "external",
"summary": "RHBZ#247726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2878",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2878"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2878",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2878"
}
],
"release_date": "2007-05-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-09-13T09:13:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0705"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "VFAT compat ioctls DoS on 64-bit"
},
{
"cve": "CVE-2007-3739",
"discovery_date": "2007-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "294941"
}
],
"notes": [
{
"category": "description",
"text": "mm/mmap.c in the hugetlb kernel, when run on PowerPC systems, does not prevent stack expansion from entering into reserved kernel page memory, which allows local users to cause a denial of service (OOPS) via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "LTC36188-Don\u0027t allow the stack to grow into hugetlb reserved regions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3739"
},
{
"category": "external",
"summary": "RHBZ#294941",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=294941"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3739",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3739"
}
],
"release_date": "2007-08-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-09-13T09:13:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0705"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "LTC36188-Don\u0027t allow the stack to grow into hugetlb reserved regions"
},
{
"cve": "CVE-2007-3740",
"discovery_date": "2007-08-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "275881"
}
],
"notes": [
{
"category": "description",
"text": "The CIFS filesystem in the Linux kernel before 2.6.22, when Unix extension support is enabled, does not honor the umask of a process, which allows local users to gain privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "CIFS should honor umask",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3740"
},
{
"category": "external",
"summary": "RHBZ#275881",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=275881"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3740",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3740"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3740",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3740"
}
],
"release_date": "2007-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-09-13T09:13:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0705"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "CIFS should honor umask"
},
{
"cve": "CVE-2007-3843",
"discovery_date": "2007-08-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "275901"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing despite sec=ntlmv2i in a SetupAndX request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "CIFS signing sec= mount options don\u0027t work correctly",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3843"
},
{
"category": "external",
"summary": "RHBZ#275901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=275901"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3843",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3843"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3843",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3843"
}
],
"release_date": "2007-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-09-13T09:13:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0705"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "CIFS signing sec= mount options don\u0027t work correctly"
},
{
"cve": "CVE-2007-3851",
"discovery_date": "2007-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "251185"
}
],
"notes": [
{
"category": "description",
"text": "The drm/i915 component in the Linux kernel before 2.6.22.2, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "i965 DRM allows insecure packets",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3851"
},
{
"category": "external",
"summary": "RHBZ#251185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=251185"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3851",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3851"
}
],
"release_date": "2007-08-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-09-13T09:13:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0705"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "i965 DRM allows insecure packets"
}
]
}
RHSA-2007_0488
Vulnerability from csaf_redhat - Published: 2007-06-25 17:50 - Updated: 2024-11-22 01:44The nlmclnt_mark_reclaim in clntlock.c in NFS lockd in Linux kernel before 2.6.16 allows remote attackers to cause a denial of service (process crash) and deny access to NFS exports via unspecified vectors that trigger a kernel oops (null dereference) and a deadlock.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
The compat_sys_mount function in fs/compat.c in Linux kernel 2.6.20 and earlier allows local users to cause a denial of service (NULL pointer dereference and oops) by mounting a smbfs file system in compatibility mode ("mount -t smbfs").
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
The Linux kernel before 2.6.9-42.0.8 in Red Hat 4.4 allows local users to cause a denial of service (kernel OOPS from null dereference) via fput in a 32-bit ioctl on 64-bit x86 systems, an incomplete fix of CVE-2005-3044.1.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
Linux kernel 2.6.x before 2.6.20 allows local users to read unreadable binaries by using the interpreter (PT_INTERP) functionality and triggering a core dump, a variant of CVE-2004-1073.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
A typo in Linux kernel 2.6 before 2.6.21-rc6 and 2.4 before 2.4.35 causes RTA_MAX to be used as an array size instead of RTN_MAX, which leads to an "out of bound access" by the (1) dn_fib_props (dn_fib.c, DECNet) and (2) fib_props (fib_semantics.c, IPv4) functions.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
Memory leak in the PPP over Ethernet (PPPoE) socket implementation in the Linux kernel before 2.6.21-git8 allows local users to cause a denial of service (memory consumption) by creating a socket using connect, and releasing it before the PPPIOCGCHAN ioctl is initialized.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by causing certain invalid states that trigger a NULL pointer dereference.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
The sysfs_readdir function in the Linux kernel 2.6, as used in Red Hat Enterprise Linux (RHEL) 4.5 and other distributions, allows users to cause a denial of service (kernel OOPS) by dereferencing a null pointer to an inode in a dentry.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix several security issues and bugs in the\nRed Hat Enterprise Linux 4 kernel are now available.\n\nThis security advisory has been rated as having important security impact\nby the Red Hat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the security issues described\nbelow:\n\n* a flaw in the connection tracking support for SCTP that allowed a remote\nuser to cause a denial of service by dereferencing a NULL pointer.\n(CVE-2007-2876, Important)\n\n* a flaw in the mount handling routine for 64-bit systems that allowed a\nlocal user to cause denial of service (crash). (CVE-2006-7203, Important)\n\n* a flaw in the IPv4 forwarding base that allowed a local user to cause an\nout-of-bounds access. (CVE-2007-2172, Important)\n\n* a flaw in the PPP over Ethernet implementation that allowed a local user\nto cause a denial of service (memory consumption) by creating a socket\nusing connect and then releasing it before the PPPIOCGCHAN ioctl has been\ncalled. (CVE-2007-2525, Important)\n\n* a flaw in the fput ioctl handling of 32-bit applications running on\n64-bit platforms that allowed a local user to cause a denial of service\n(panic). (CVE-2007-0773, Important)\n\n* a flaw in the NFS locking daemon that allowed a local user to cause\ndenial of service (deadlock). (CVE-2006-5158, Moderate)\n\n* a flaw in the sysfs_readdir function that allowed a local user to cause a\ndenial of service by dereferencing a NULL pointer. (CVE-2007-3104, Moderate)\n\n* a flaw in the core-dump handling that allowed a local user to create core\ndumps from unreadable binaries via PT_INTERP. (CVE-2007-0958, Low) \n\n* a flaw in the Bluetooth subsystem that allowed a local user to trigger an\ninformation leak. (CVE-2007-1353, Low)\n\nIn addition, the following bugs were addressed:\n\n* the NFS could recurse on the same spinlock. Also, NFS, under certain\nconditions, did not completely clean up Posix locks on a file close,\nleading to mount failures.\n\n* the 32bit compatibility didn\u0027t return to userspace correct values for the\nrt_sigtimedwait system call.\n\n* the count for unused inodes could be incorrect at times, resulting in\ndirty data not being written to disk in a timely manner.\n\n* the cciss driver had an incorrect disk size calculation (off-by-one\nerror) which prevented disk dumps.\n\nRed Hat would like to thank Ilja van Sprundel and the OpenVZ Linux kernel\nteam for reporting issues fixed in this erratum.\n\nAll Red Hat Enterprise Linux 4 users are advised to upgrade their kernels\nto the packages associated with their machine architectures and\nconfigurations as listed in this erratum.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0488",
"url": "https://access.redhat.com/errata/RHSA-2007:0488"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#important",
"url": "https://access.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "240855",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=240855"
},
{
"category": "external",
"summary": "241784",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=241784"
},
{
"category": "external",
"summary": "242558",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=242558"
},
{
"category": "external",
"summary": "243251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243251"
},
{
"category": "external",
"summary": "243252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243252"
},
{
"category": "external",
"summary": "243256",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243256"
},
{
"category": "external",
"summary": "243259",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243259"
},
{
"category": "external",
"summary": "243261",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243261"
},
{
"category": "external",
"summary": "243262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243262"
},
{
"category": "external",
"summary": "243263",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243263"
},
{
"category": "external",
"summary": "243746",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243746"
},
{
"category": "external",
"summary": "243902",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243902"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0488.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-22T01:44:30+00:00",
"generator": {
"date": "2024-11-22T01:44:30+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2007:0488",
"initial_release_date": "2007-06-25T17:50:00+00:00",
"revision_history": [
{
"date": "2007-06-25T17:50:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2008-01-09T13:29:42+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T01:44:30+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-55.0.2.EL.i686",
"product": {
"name": "kernel-0:2.6.9-55.0.2.EL.i686",
"product_id": "kernel-0:2.6.9-55.0.2.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-55.0.2.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"product": {
"name": "kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"product_id": "kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-55.0.2.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"product": {
"name": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"product_id": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-55.0.2.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"product": {
"name": "kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"product_id": "kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-55.0.2.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-0:2.6.9-55.0.2.EL.i686",
"product": {
"name": "kernel-smp-0:2.6.9-55.0.2.EL.i686",
"product_id": "kernel-smp-0:2.6.9-55.0.2.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp@2.6.9-55.0.2.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"product_id": "kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-55.0.2.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-55.0.2.EL.i686",
"product": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.i686",
"product_id": "kernel-devel-0:2.6.9-55.0.2.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-55.0.2.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"product": {
"name": "kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"product_id": "kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-hugemem-devel@2.6.9-55.0.2.EL?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"product": {
"name": "kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"product_id": "kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-hugemem@2.6.9-55.0.2.EL?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-55.0.2.EL.ia64",
"product": {
"name": "kernel-0:2.6.9-55.0.2.EL.ia64",
"product_id": "kernel-0:2.6.9-55.0.2.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-55.0.2.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"product_id": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-55.0.2.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"product": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"product_id": "kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-55.0.2.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"product": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"product_id": "kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-55.0.2.EL?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"product_id": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-55.0.2.EL?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-55.0.2.EL.src",
"product": {
"name": "kernel-0:2.6.9-55.0.2.EL.src",
"product_id": "kernel-0:2.6.9-55.0.2.EL.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-55.0.2.EL?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-55.0.2.EL.x86_64",
"product": {
"name": "kernel-0:2.6.9-55.0.2.EL.x86_64",
"product_id": "kernel-0:2.6.9-55.0.2.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-55.0.2.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"product": {
"name": "kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"product_id": "kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU@2.6.9-55.0.2.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"product": {
"name": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"product_id": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xenU-devel@2.6.9-55.0.2.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"product": {
"name": "kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"product_id": "kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp-devel@2.6.9-55.0.2.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"product": {
"name": "kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"product_id": "kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-smp@2.6.9-55.0.2.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"product_id": "kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-55.0.2.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"product": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"product_id": "kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-55.0.2.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"product": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"product_id": "kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-55.0.2.EL?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"product_id": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-55.0.2.EL?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"product": {
"name": "kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"product_id": "kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.9-55.0.2.EL?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-55.0.2.EL.ppc64",
"product": {
"name": "kernel-0:2.6.9-55.0.2.EL.ppc64",
"product_id": "kernel-0:2.6.9-55.0.2.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-55.0.2.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"product_id": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-55.0.2.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"product": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"product_id": "kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp@2.6.9-55.0.2.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"product": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"product_id": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-55.0.2.EL?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"product": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"product_id": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-largesmp-devel@2.6.9-55.0.2.EL?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"product": {
"name": "kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"product_id": "kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-55.0.2.EL?arch=ppc64iseries"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"product": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"product_id": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-55.0.2.EL?arch=ppc64iseries"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"product": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"product_id": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-55.0.2.EL?arch=ppc64iseries"
}
}
}
],
"category": "architecture",
"name": "ppc64iseries"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-55.0.2.EL.s390x",
"product": {
"name": "kernel-0:2.6.9-55.0.2.EL.s390x",
"product_id": "kernel-0:2.6.9-55.0.2.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-55.0.2.EL?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"product_id": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-55.0.2.EL?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"product": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"product_id": "kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-55.0.2.EL?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.9-55.0.2.EL.s390",
"product": {
"name": "kernel-0:2.6.9-55.0.2.EL.s390",
"product_id": "kernel-0:2.6.9-55.0.2.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.9-55.0.2.EL?arch=s390"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"product": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"product_id": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.9-55.0.2.EL?arch=s390"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.9-55.0.2.EL.s390",
"product": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.s390",
"product_id": "kernel-devel-0:2.6.9-55.0.2.EL.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.9-55.0.2.EL?arch=s390"
}
}
}
],
"category": "architecture",
"name": "s390"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-55.0.2.EL.s390"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-55.0.2.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-55.0.2.EL.src"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-55.0.2.EL.noarch as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-55.0.2.EL.s390"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-55.0.2.EL.src"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-55.0.2.EL.noarch as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-55.0.2.EL.s390"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-55.0.2.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-55.0.2.EL.src"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-55.0.2.EL.noarch as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-55.0.2.EL.s390"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-55.0.2.EL.s390x"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-55.0.2.EL.src"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.9-55.0.2.EL.noarch as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch"
},
"product_reference": "kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-smp-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
},
"product_reference": "kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"relates_to_product_reference": "4WS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-5158",
"discovery_date": "2006-10-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "243251"
}
],
"notes": [
{
"category": "description",
"text": "The nlmclnt_mark_reclaim in clntlock.c in NFS lockd in Linux kernel before 2.6.16 allows remote attackers to cause a denial of service (process crash) and deny access to NFS exports via unspecified vectors that trigger a kernel oops (null dereference) and a deadlock.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "NFS lockd deadlock",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue does not affect Red Hat Enterprise Linux 2.1 or 3.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-5158"
},
{
"category": "external",
"summary": "RHBZ#243251",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243251"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-5158",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-5158"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-5158",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-5158"
}
],
"release_date": "2006-09-28T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-06-25T17:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0488"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "NFS lockd deadlock"
},
{
"acknowledgments": [
{
"names": [
"SWsoft Virtuozzo/OpenVZ Linux kernel team"
]
}
],
"cve": "CVE-2006-7203",
"discovery_date": "2007-05-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "239767"
}
],
"notes": [
{
"category": "description",
"text": "The compat_sys_mount function in fs/compat.c in Linux kernel 2.6.20 and earlier allows local users to cause a denial of service (NULL pointer dereference and oops) by mounting a smbfs file system in compatibility mode (\"mount -t smbfs\").",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "oops in compat_sys_mount() when data pointer is NULL",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2006-7203"
},
{
"category": "external",
"summary": "RHBZ#239767",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=239767"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2006-7203",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-7203"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2006-7203",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2006-7203"
}
],
"release_date": "2007-05-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-06-25T17:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0488"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "oops in compat_sys_mount() when data pointer is NULL"
},
{
"acknowledgments": [
{
"names": [
"the SWsoft Virtuozzo/OpenVZ Linux kernel team"
]
}
],
"cve": "CVE-2007-0773",
"discovery_date": "2007-02-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "243252"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel before 2.6.9-42.0.8 in Red Hat 4.4 allows local users to cause a denial of service (kernel OOPS from null dereference) via fput in a 32-bit ioctl on 64-bit x86 systems, an incomplete fix of CVE-2005-3044.1.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "lost fput in a 32-bit ioctl on 64-bit x86 systems",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-0773"
},
{
"category": "external",
"summary": "RHBZ#243252",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243252"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-0773",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0773"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-0773",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0773"
}
],
"release_date": "2007-06-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-06-25T17:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0488"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "lost fput in a 32-bit ioctl on 64-bit x86 systems"
},
{
"cve": "CVE-2007-0958",
"discovery_date": "2006-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "243256"
}
],
"notes": [
{
"category": "description",
"text": "Linux kernel 2.6.x before 2.6.20 allows local users to read unreadable binaries by using the interpreter (PT_INTERP) functionality and triggering a core dump, a variant of CVE-2004-1073.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "core-dumping unreadable binaries via PT_INTERP",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-0958"
},
{
"category": "external",
"summary": "RHBZ#243256",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243256"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-0958",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0958"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-0958",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-0958"
}
],
"release_date": "2007-01-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-06-25T17:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0488"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "core-dumping unreadable binaries via PT_INTERP"
},
{
"acknowledgments": [
{
"names": [
"Ilja van Sprundel"
]
}
],
"cve": "CVE-2007-1353",
"discovery_date": "2007-03-28T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "243259"
}
],
"notes": [
{
"category": "description",
"text": "The setsockopt function in the L2CAP and HCI Bluetooth support in the Linux kernel before 2.4.34.3 allows context-dependent attackers to read kernel memory and obtain sensitive information via unspecified vectors involving the copy_from_user function accessing an uninitialized stack buffer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Bluetooth setsockopt() information leaks",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-1353"
},
{
"category": "external",
"summary": "RHBZ#243259",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243259"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-1353",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1353"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1353",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1353"
}
],
"release_date": "2007-04-18T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-06-25T17:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0488"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "Bluetooth setsockopt() information leaks"
},
{
"cve": "CVE-2007-2172",
"discovery_date": "2007-04-13T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "250429"
}
],
"notes": [
{
"category": "description",
"text": "A typo in Linux kernel 2.6 before 2.6.21-rc6 and 2.4 before 2.4.35 causes RTA_MAX to be used as an array size instead of RTN_MAX, which leads to an \"out of bound access\" by the (1) dn_fib_props (dn_fib.c, DECNet) and (2) fib_props (fib_semantics.c, IPv4) functions.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "fib_semantics.c out of bounds access vulnerability",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2172"
},
{
"category": "external",
"summary": "RHBZ#250429",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=250429"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2172"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2172",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2172"
}
],
"release_date": "2007-03-26T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-06-25T17:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0488"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "fib_semantics.c out of bounds access vulnerability"
},
{
"cve": "CVE-2007-2525",
"discovery_date": "2007-05-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "243262"
}
],
"notes": [
{
"category": "description",
"text": "Memory leak in the PPP over Ethernet (PPPoE) socket implementation in the Linux kernel before 2.6.21-git8 allows local users to cause a denial of service (memory consumption) by creating a socket using connect, and releasing it before the PPPIOCGCHAN ioctl is initialized.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "PPPoE socket PPPIOCGCHAN denial of service",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2525"
},
{
"category": "external",
"summary": "RHBZ#243262",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=243262"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2525",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2525"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2525",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2525"
}
],
"release_date": "2007-05-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-06-25T17:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0488"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "PPPoE socket PPPIOCGCHAN denial of service"
},
{
"cve": "CVE-2007-2876",
"discovery_date": "2007-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "245774"
}
],
"notes": [
{
"category": "description",
"text": "The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by causing certain invalid states that trigger a NULL pointer dereference.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nf}_conntrack_sctp: remotely triggerable NULL ptr dereference",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2876"
},
{
"category": "external",
"summary": "RHBZ#245774",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245774"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2876",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2876"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2876",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2876"
}
],
"release_date": "2007-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-06-25T17:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0488"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nf}_conntrack_sctp: remotely triggerable NULL ptr dereference"
},
{
"cve": "CVE-2007-3104",
"discovery_date": "2007-04-25T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "427994"
}
],
"notes": [
{
"category": "description",
"text": "The sysfs_readdir function in the Linux kernel 2.6, as used in Red Hat Enterprise Linux (RHEL) 4.5 and other distributions, allows users to cause a denial of service (kernel OOPS) by dereferencing a null pointer to an inode in a dentry.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Null pointer to an inode in a dentry can cause an oops in sysfs_readdir",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3104"
},
{
"category": "external",
"summary": "RHBZ#427994",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=427994"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3104",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3104"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3104",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3104"
}
],
"release_date": "2007-06-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-06-25T17:50:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"4AS:kernel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-0:2.6.9-55.0.2.EL.src",
"4AS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4AS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4AS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4AS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4AS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.src",
"4Desktop:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4Desktop:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4Desktop:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4Desktop:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4Desktop:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-0:2.6.9-55.0.2.EL.src",
"4ES:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4ES:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4ES:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4ES:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4ES:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-0:2.6.9-55.0.2.EL.src",
"4WS:kernel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-debuginfo-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.ppc64iseries",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.s390x",
"4WS:kernel-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-doc-0:2.6.9-55.0.2.EL.noarch",
"4WS:kernel-hugemem-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-hugemem-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ia64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.ppc64",
"4WS:kernel-largesmp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-smp-devel-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-0:2.6.9-55.0.2.EL.x86_64",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.i686",
"4WS:kernel-xenU-devel-0:2.6.9-55.0.2.EL.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0488"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Null pointer to an inode in a dentry can cause an oops in sysfs_readdir"
}
]
}
RHSA-2007_0705
Vulnerability from csaf_redhat - Published: 2007-09-13 09:13 - Updated: 2024-11-22 01:36Buffer overflow in the bufprint function in capiutil.c in libcapi, as used in Linux kernel 2.6.9 to 2.6.20 and isdn4k-utils, allows local users to cause a denial of service (crash) and possibly gain privileges via a crafted CAPI packet.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
Integer underflow in the cpuset_tasks_read function in the Linux kernel before 2.6.20.13, and 2.6.21.x before 2.6.21.4, when the cpuset filesystem is mounted, allows local users to obtain kernel memory contents by using a large offset when reading the /dev/cpuset/tasks file.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by causing certain invalid states that trigger a NULL pointer dereference.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
The VFAT compat ioctls in the Linux kernel before 2.6.21.2, when run on a 64-bit system, allow local users to corrupt a kernel_dirent struct and cause a denial of service (system crash) via unknown vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
mm/mmap.c in the hugetlb kernel, when run on PowerPC systems, does not prevent stack expansion from entering into reserved kernel page memory, which allows local users to cause a denial of service (OOPS) via unspecified vectors.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
The CIFS filesystem in the Linux kernel before 2.6.22, when Unix extension support is enabled, does not honor the umask of a process, which allows local users to gain privileges.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing despite sec=ntlmv2i in a SetupAndX request.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
The drm/i915 component in the Linux kernel before 2.6.22.2, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer.
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.src | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 | — |
Vendor Fix
fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated kernel packages that fix various security issues in the Red Hat\nEnterprise Linux 5 kernel are now available.\n\nThis update has been rated as having important security impact by the Red\nHat Security Response Team.",
"title": "Topic"
},
{
"category": "general",
"text": "The Linux kernel handles the basic functions of the operating system.\n\nThese new kernel packages contain fixes for the following security issues:\n\n* a flaw in the DRM driver for Intel graphics cards that allowed a local\nuser to access any part of the main memory. To access the DRM functionality\na user must have access to the X server which is granted through the\ngraphical login. This also only affected systems with an Intel 965 or later\ngraphic chipset. (CVE-2007-3851, Important)\n\n* a flaw in the VFAT compat ioctl handling on 64-bit systems that allowed a\nlocal user to corrupt a kernel_dirent struct and cause a denial of service\n(system crash). (CVE-2007-2878, Important)\n\n* a flaw in the connection tracking support for SCTP that allowed a remote\nuser to cause a denial of service by dereferencing a NULL pointer.\n(CVE-2007-2876, Important)\n\n* flaw in the CIFS filesystem which could cause the umask values of a\nprocess to not be honored. This affected CIFS filesystems where the Unix\nextensions are supported. (CVE-2007-3740, Important)\n\n* a flaw in the stack expansion when using the hugetlb kernel on PowerPC\nsystems that allowed a local user to cause a denial of service.\n(CVE-2007-3739, Moderate)\n\n* a flaw in the ISDN CAPI subsystem that allowed a remote user to cause a\ndenial of service or potential remote access. Exploitation would require\nthe attacker to be able to send arbitrary frames over the ISDN network to\nthe victim\u0027s machine. (CVE-2007-1217, Moderate)\n\n* a flaw in the cpuset support that allowed a local user to obtain\nsensitive information from kernel memory. To exploit this the cpuset\nfilesystem would have to already be mounted. (CVE-2007-2875, Moderate)\n\n* a flaw in the CIFS handling of the mount option \"sec=\" that didn\u0027t enable\nintegrity checking and didn\u0027t produce any error message. (CVE-2007-3843,\nLow)\n\nRed Hat Enterprise Linux 5 users are advised to upgrade to these packages,\nwhich contain backported patches to correct these issues.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2007:0705",
"url": "https://access.redhat.com/errata/RHSA-2007:0705"
},
{
"category": "external",
"summary": "http://www.redhat.com/security/updates/classification/#important",
"url": "http://www.redhat.com/security/updates/classification/#important"
},
{
"category": "external",
"summary": "232260",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=232260"
},
{
"category": "external",
"summary": "245773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245773"
},
{
"category": "external",
"summary": "245774",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245774"
},
{
"category": "external",
"summary": "247726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247726"
},
{
"category": "external",
"summary": "251185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=251185"
},
{
"category": "external",
"summary": "253313",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=253313"
},
{
"category": "external",
"summary": "253314",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=253314"
},
{
"category": "external",
"summary": "253315",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=253315"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2007/rhsa-2007_0705.json"
}
],
"title": "Red Hat Security Advisory: kernel security update",
"tracking": {
"current_release_date": "2024-11-22T01:36:20+00:00",
"generator": {
"date": "2024-11-22T01:36:20+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2007:0705",
"initial_release_date": "2007-09-13T09:13:00+00:00",
"revision_history": [
{
"date": "2007-09-13T09:13:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2007-09-13T05:21:22+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T01:36:20+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product": {
"name": "Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::client"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"product_id": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-8.1.10.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"product": {
"name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"product_id": "kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-8.1.10.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"product": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"product_id": "kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-8.1.10.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-8.1.10.el5.i686",
"product": {
"name": "kernel-0:2.6.18-8.1.10.el5.i686",
"product_id": "kernel-0:2.6.18-8.1.10.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-8.1.10.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-8.1.10.el5.i686",
"product": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.i686",
"product_id": "kernel-devel-0:2.6.18-8.1.10.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-8.1.10.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"product": {
"name": "kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"product_id": "kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-devel@2.6.18-8.1.10.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"product": {
"name": "kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"product_id": "kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE-debuginfo@2.6.18-8.1.10.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"product_id": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-8.1.10.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-8.1.10.el5.i686",
"product": {
"name": "kernel-xen-0:2.6.18-8.1.10.el5.i686",
"product_id": "kernel-xen-0:2.6.18-8.1.10.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-8.1.10.el5?arch=i686"
}
}
},
{
"category": "product_version",
"name": "kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"product": {
"name": "kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"product_id": "kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-PAE@2.6.18-8.1.10.el5?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-8.1.10.el5.i386",
"product": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.i386",
"product_id": "kernel-headers-0:2.6.18-8.1.10.el5.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-8.1.10.el5?arch=i386"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"product_id": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-8.1.10.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"product_id": "kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-8.1.10.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"product_id": "kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-8.1.10.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-8.1.10.el5.x86_64",
"product": {
"name": "kernel-0:2.6.18-8.1.10.el5.x86_64",
"product_id": "kernel-0:2.6.18-8.1.10.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-8.1.10.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"product": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"product_id": "kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-8.1.10.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-8.1.10.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"product": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"product_id": "kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-8.1.10.el5?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"product": {
"name": "kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"product_id": "kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-8.1.10.el5?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-0:2.6.18-8.1.10.el5.src",
"product": {
"name": "kernel-0:2.6.18-8.1.10.el5.src",
"product_id": "kernel-0:2.6.18-8.1.10.el5.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-8.1.10.el5?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"product": {
"name": "kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"product_id": "kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-doc@2.6.18-8.1.10.el5?arch=noarch"
}
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"product_id": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-8.1.10.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"product": {
"name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"product_id": "kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-devel@2.6.18-8.1.10.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"product_id": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-8.1.10.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-8.1.10.el5.ia64",
"product": {
"name": "kernel-0:2.6.18-8.1.10.el5.ia64",
"product_id": "kernel-0:2.6.18-8.1.10.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-8.1.10.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"product": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"product_id": "kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-8.1.10.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"product": {
"name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"product_id": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen-debuginfo@2.6.18-8.1.10.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"product": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"product_id": "kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-8.1.10.el5?arch=ia64"
}
}
},
{
"category": "product_version",
"name": "kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"product": {
"name": "kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"product_id": "kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-xen@2.6.18-8.1.10.el5?arch=ia64"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"product_id": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-8.1.10.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"product": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"product_id": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-8.1.10.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-8.1.10.el5.ppc64",
"product": {
"name": "kernel-0:2.6.18-8.1.10.el5.ppc64",
"product_id": "kernel-0:2.6.18-8.1.10.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-8.1.10.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"product": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"product_id": "kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-8.1.10.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"product": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"product_id": "kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-8.1.10.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"product": {
"name": "kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"product_id": "kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-debuginfo@2.6.18-8.1.10.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"product": {
"name": "kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"product_id": "kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump@2.6.18-8.1.10.el5?arch=ppc64"
}
}
},
{
"category": "product_version",
"name": "kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"product": {
"name": "kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"product_id": "kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-kdump-devel@2.6.18-8.1.10.el5?arch=ppc64"
}
}
}
],
"category": "architecture",
"name": "ppc64"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"product": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"product_id": "kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-8.1.10.el5?arch=ppc"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"product": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"product_id": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo-common@2.6.18-8.1.10.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"product": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"product_id": "kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-debuginfo@2.6.18-8.1.10.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-0:2.6.18-8.1.10.el5.s390x",
"product": {
"name": "kernel-0:2.6.18-8.1.10.el5.s390x",
"product_id": "kernel-0:2.6.18-8.1.10.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel@2.6.18-8.1.10.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"product": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"product_id": "kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-devel@2.6.18-8.1.10.el5?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"product": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"product_id": "kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/kernel-headers@2.6.18-8.1.10.el5?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-8.1.10.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-8.1.10.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-8.1.10.el5.src as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-8.1.10.el5.src"
},
"product_reference": "kernel-0:2.6.18-8.1.10.el5.src",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-8.1.10.el5.noarch as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.i386 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.i386",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.ppc as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 5 client)",
"product_id": "5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Client"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-8.1.10.el5.s390x"
},
"product_reference": "kernel-0:2.6.18-8.1.10.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-8.1.10.el5.src as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-8.1.10.el5.src"
},
"product_reference": "kernel-0:2.6.18-8.1.10.el5.src",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x"
},
"product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x"
},
"product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-devel-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-doc-0:2.6.18-8.1.10.el5.noarch as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch"
},
"product_reference": "kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.i386 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386"
},
"product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.i386",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.ppc as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc"
},
"product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.s390x as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x"
},
"product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-headers-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64"
},
"product_reference": "kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-xen-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.i686 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686"
},
"product_reference": "kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"relates_to_product_reference": "5Server"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64 as a component of Red Hat Enterprise Linux (v. 5 server)",
"product_id": "5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
},
"product_reference": "kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"relates_to_product_reference": "5Server"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2007-1217",
"discovery_date": "2007-03-14T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "402741"
}
],
"notes": [
{
"category": "description",
"text": "Buffer overflow in the bufprint function in capiutil.c in libcapi, as used in Linux kernel 2.6.9 to 2.6.20 and isdn4k-utils, allows local users to cause a denial of service (crash) and possibly gain privileges via a crafted CAPI packet.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "Kernel: CAPI overflow",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-1217"
},
{
"category": "external",
"summary": "RHBZ#402741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=402741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-1217",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1217"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-1217",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-1217"
}
],
"release_date": "2007-03-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-09-13T09:13:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0705"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "Kernel: CAPI overflow"
},
{
"cve": "CVE-2007-2875",
"discovery_date": "2007-06-04T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "245773"
}
],
"notes": [
{
"category": "description",
"text": "Integer underflow in the cpuset_tasks_read function in the Linux kernel before 2.6.20.13, and 2.6.21.x before 2.6.21.4, when the cpuset filesystem is mounted, allows local users to obtain kernel memory contents by using a large offset when reading the /dev/cpuset/tasks file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "cpuset information leak",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2875"
},
{
"category": "external",
"summary": "RHBZ#245773",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245773"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2875",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2875"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2875",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2875"
}
],
"release_date": "2007-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-09-13T09:13:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0705"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "cpuset information leak"
},
{
"cve": "CVE-2007-2876",
"discovery_date": "2007-06-05T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "245774"
}
],
"notes": [
{
"category": "description",
"text": "The sctp_new function in (1) ip_conntrack_proto_sctp.c and (2) nf_conntrack_proto_sctp.c in Netfilter in Linux kernel 2.6 before 2.6.20.13, and 2.6.21.x before 2.6.21.4, allows remote attackers to cause a denial of service by causing certain invalid states that trigger a NULL pointer dereference.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "nf}_conntrack_sctp: remotely triggerable NULL ptr dereference",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2876"
},
{
"category": "external",
"summary": "RHBZ#245774",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=245774"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2876",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2876"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2876",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2876"
}
],
"release_date": "2007-06-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-09-13T09:13:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0705"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "nf}_conntrack_sctp: remotely triggerable NULL ptr dereference"
},
{
"cve": "CVE-2007-2878",
"discovery_date": "2007-05-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "247726"
}
],
"notes": [
{
"category": "description",
"text": "The VFAT compat ioctls in the Linux kernel before 2.6.21.2, when run on a 64-bit system, allow local users to corrupt a kernel_dirent struct and cause a denial of service (system crash) via unknown vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "VFAT compat ioctls DoS on 64-bit",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-2878"
},
{
"category": "external",
"summary": "RHBZ#247726",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=247726"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-2878",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-2878"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-2878",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-2878"
}
],
"release_date": "2007-05-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-09-13T09:13:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0705"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "VFAT compat ioctls DoS on 64-bit"
},
{
"cve": "CVE-2007-3739",
"discovery_date": "2007-07-10T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "294941"
}
],
"notes": [
{
"category": "description",
"text": "mm/mmap.c in the hugetlb kernel, when run on PowerPC systems, does not prevent stack expansion from entering into reserved kernel page memory, which allows local users to cause a denial of service (OOPS) via unspecified vectors.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "LTC36188-Don\u0027t allow the stack to grow into hugetlb reserved regions",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3739"
},
{
"category": "external",
"summary": "RHBZ#294941",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=294941"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3739",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3739"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3739",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3739"
}
],
"release_date": "2007-08-31T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-09-13T09:13:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0705"
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "LTC36188-Don\u0027t allow the stack to grow into hugetlb reserved regions"
},
{
"cve": "CVE-2007-3740",
"discovery_date": "2007-08-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "275881"
}
],
"notes": [
{
"category": "description",
"text": "The CIFS filesystem in the Linux kernel before 2.6.22, when Unix extension support is enabled, does not honor the umask of a process, which allows local users to gain privileges.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "CIFS should honor umask",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3740"
},
{
"category": "external",
"summary": "RHBZ#275881",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=275881"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3740",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3740"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3740",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3740"
}
],
"release_date": "2007-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-09-13T09:13:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0705"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "CIFS should honor umask"
},
{
"cve": "CVE-2007-3843",
"discovery_date": "2007-08-02T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "275901"
}
],
"notes": [
{
"category": "description",
"text": "The Linux kernel before 2.6.23-rc1 checks the wrong global variable for the CIFS sec mount option, which might allow remote attackers to spoof CIFS network traffic that the client configured for security signatures, as demonstrated by lack of signing despite sec=ntlmv2i in a SetupAndX request.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "CIFS signing sec= mount options don\u0027t work correctly",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This issue did not affect the versions of the Linux kernel as shipped with Red Hat Enterprise Linux 2.1 or 3.",
"title": "Statement"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3843"
},
{
"category": "external",
"summary": "RHBZ#275901",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=275901"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3843",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3843"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3843",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3843"
}
],
"release_date": "2007-06-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-09-13T09:13:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0705"
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "CIFS signing sec= mount options don\u0027t work correctly"
},
{
"cve": "CVE-2007-3851",
"discovery_date": "2007-08-07T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "251185"
}
],
"notes": [
{
"category": "description",
"text": "The drm/i915 component in the Linux kernel before 2.6.22.2, when used with i965G and later chipsets, allows local users with access to an X11 session and Direct Rendering Manager (DRM) to write to arbitrary memory locations and gain privileges via a crafted batchbuffer.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "i965 DRM allows insecure packets",
"title": "Vulnerability summary"
}
],
"product_status": {
"fixed": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2007-3851"
},
{
"category": "external",
"summary": "RHBZ#251185",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=251185"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2007-3851",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-3851"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2007-3851",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2007-3851"
}
],
"release_date": "2007-08-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2007-09-13T09:13:00+00:00",
"details": "Before applying this update, make sure that all previously-released\nerrata relevant to your system have been applied. \n\nThis update is available via Red Hat Network. Details on how to use \nthe Red Hat Network to apply this update are available at\nhttp://kbase.redhat.com/faq/FAQ_58_10188",
"product_ids": [
"5Client:kernel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-0:2.6.18-8.1.10.el5.src",
"5Client:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Client:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Client:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-0:2.6.18-8.1.10.el5.src",
"5Server:kernel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-PAE-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-PAE-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-debuginfo-common-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-devel-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-doc-0:2.6.18-8.1.10.el5.noarch",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.i386",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.s390x",
"5Server:kernel-headers-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-kdump-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-debuginfo-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-kdump-devel-0:2.6.18-8.1.10.el5.ppc64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-debuginfo-0:2.6.18-8.1.10.el5.x86_64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.i686",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.ia64",
"5Server:kernel-xen-devel-0:2.6.18-8.1.10.el5.x86_64"
],
"restart_required": {
"category": "machine"
},
"url": "https://access.redhat.com/errata/RHSA-2007:0705"
}
],
"threats": [
{
"category": "impact",
"details": "Important"
}
],
"title": "i965 DRM allows insecure packets"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.